Listing Thumbnail

    CyberArk DevSecOps

     Info
    Sold by: CyberArk 
    Deployed on AWS
    CyberArk secrets management solutions enable applications and automation tools to securely access sensitive resources at scale - without burdening your developers.

    Overview

    CyberArk Secrets Manager offers solutions which enable applications, automation tools and other non-human identities to secure the credentials and secrets used to access cloud and other IT resources at scale - without burdening developers.

    CyberArk Secrets Hub Security teams gain full visibility, including a centralized view of secrets used across multiple AWS Accounts and AWS Secrets Manager (ASM) instances. Centrally secures and rotates secrets in ASM without changing the developer's experience or workflow. This SaaS solution helps reduce vault sprawl and simplifies securing AWS and hybrid environments.

    CyberArk Conjur Cloud SaaS based solution which centrally secures, rotates and manages secrets across multi-cloud and hybrid environments. Helps eliminate vault sprawl and provides visibility to security teams with a central view of all secrets used across the enterprise. Offers REST APIs and integrates with a wide range of DevOps tools and container platforms.

    CyberArk Conjur Secrets Manager Enterprise Securely authenticates, centrally controls and audits how applications, DevOps and automation tools use secrets and privileged credentials to access databases, cloud environments and other sensitive resources. Designed to massively scale and support data sovereignty and other requirements for large global enterprises.

    Conjur Secrets Manager Open Source A freely available open-source solution to securely authenticate and control applications, and DevOps tools which use secrets and privileged credentials to access databases, cloud environments and other sensitive resources.

    CyberArk Credential Providers A versatile solution which secures the credentials used by a broad range of third-party software such as vulnerability scanners, RPA, automation tools, and IT management platforms. Also protects business-system data and simplifies operations by securely delivering credentials at scale to static in-house developed and other mission critical applications, including mainframe.

    For custom pricing, EULA, or a private offer, please contact AWS-Marketplace@cyberark.com 

    Highlights

    • Strengthens protection against the leading cause of breaches - compromised identities and credentials
    • Provides visibility and control across multiple AWS accounts, eliminating vault sprawl
    • Meets the needs of security teams without changing the developer's cloud-native experience

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    CyberArk DevSecOps

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    DevSecOps- Secrets MNGR
    Cyberark DevSecOps - Secrets Manager - 20 Users
    $23,328.00

    Vendor refund policy

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Contact CyberArk for support related questions: www.cyberark.com/customer-support/  Contact CyberArk for support related questions: www.cyberark.com/customer-support/ 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    3.5
    1 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    100%
    0%
    0%
    1 AWS reviews
    |
    20 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    reviewer2711862

    Offers seamless integration and enhances security but requires better documentation

    Reviewed on May 28, 2025
    Review from a verified AWS customer

    What is our primary use case?

    My main use cases at the moment promote security all across the organization.

    What is most valuable?

    The features of CyberArk Secrets Management  that I value the most are flexibility and the numerous integration offerings they have. It is not easy to use, but it is secure enough.

    I utilize the credential rotation automation feature.

    It has helped reduce human error and mitigate the risk of data breaches significantly. From a scale perspective, once configured, there is much less friction in terms of human involvement inside the procedure, which gives us much more confidence that we are getting what we wanted.

    I would assess the integration capabilities of CyberArk Secrets Management  with existing applications, databases, and dev tools as straightforward. It is very easy as they supported many tools we were using.

    I use the audit trails for compliance purposes.

    The audit trails have been extremely important for us in helping our organization meet regulatory requirements. It actually enabled us to do things that would have been impossible without it.

    CyberArk Secrets Management has been able to enforce granular access controls, and that has impacted our security strategy by giving us more ability to interact with third parties knowing that CyberArk Secrets Management keeps us safe.

    What needs improvement?

    There is room for improvement with better documentation and less need for CyberArk Secrets Management personnel to assist us with their presence.

    For how long have I used the solution?

    I have been using CyberArk Secrets Management for three months.

    What was my experience with deployment of the solution?

    The experience of deployment had constant challenges.

    What do I think about the stability of the solution?

    It has been reliable so far with no downtime or crashes.

    What do I think about the scalability of the solution?

    It has scaled with the growing needs of my organization, but we are still in the early stages. It is hard to say, but we do see a lot of potential.

    How are customer service and support?

    I have had to use their customer support and technical support. We are working with the professional services now to implement the solution.

    I would rate them six out of ten for customer service.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We were using CyberArk products prior to taking on CyberArk Secrets Management. We have multiple CyberArk products already deployed in the organization.

    Which other solutions did I evaluate?

    I considered Akeyless as another solution before selecting CyberArk Secrets Management.

    What other advice do I have?

    I would rate CyberArk Secrets Management overall a seven out of ten.

    Rajat-Jain

    Helps with compliance and improves operational flexibility

    Reviewed on Mar 14, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We own a robotic process automation platform called UiPath . We use CyberArk Secrets Management  to bring the credentials into robotic process automation for the bots during runtime.

    How has it helped my organization?

    With CyberArk Secrets Management, we were able to resolve the automatic change of the passwords based on timelines. We were also able to retrieve the passwords in an encrypted format by utilizing the CyberArk platform, which was not provided to us by UiPath.

    Moving CyberArk Secrets Management  from on-premise to a SaaS model has improved flexibility and reduced server utilization. It gives us more flexibility to interact with other platforms.

    What is most valuable?

    The automatic rotation of the password is the top feature. The integration with the platform allows for a direct change of the password. No one sees the passwords while resetting or upgrading them. The automatic rotation of passwords is crucial.

    What needs improvement?

    The user interface can be improved, and with new platforms emerging, CyberArk Secrets Management could integrate with them. The password search feature and integration between different vaults could be enhanced. For instance, when updating passwords in both lower and higher environment vaults, improvement is required in search and upgrade functions.

    For how long have I used the solution?

    I have been using it for almost five years now.

    What do I think about the stability of the solution?

    It is stable. I would rate it a nine out of ten for stability.

    What do I think about the scalability of the solution?

    It is scalable. I would rate it a nine out of ten for scalability.

    Its utilization is based on the requests from applications. Whenever we have a new application in the environment and they have a requirement to retrieve the passwords from a secure vault, we create a vault for them, and then they utilize that application.

    We have 200 to 250 automation bots. They are utilized by the whole department, not by a single person. Enterprise-wide, there are about 1,000 users.

    How are customer service and support?

    We did not have a good experience with technical support because their numerous processes caused delays in engaging, leading to project delays or issues with production.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    Before CyberArk Secrets Management, we did not use any similar product. We used internal key vaults specific to a particular laptop, such as the Windows key vault, or the UiPath  assets built into the orchestrator.

    How was the initial setup?

    We have had both on-premises and SaaS models. The on-premise setup was a little difficult, but now that it has been moved to the SaaS model, everything is controlled by CyberArk. We just go and do our work.

    The initial on-premises setup took two weeks because it was an integrated effort. I had to spin up the servers and bring in the CyberArk Secrets Management resource to deploy the scripts. I then had to open networks and firewalls between CyberArk Secrets Management's on-premise servers and the application server. In the initial phase, it took two to three weeks, but it became easier when moving to the SaaS model.

    In terms of maintenance, it requires patching or upgrades, which happens one day in a month. If there is a failure, we have to roll back and try once again, which takes more time, but if everything goes smoothly, there is three to five hours of downtime.

    What was our ROI?

    The return on investment is primarily in compliance. During audits, such as SOC audits happening quarterly, having passwords saved and retrieved in an encrypted manner is a significant advantage. It allows us to pass all audits. It is mainly towards SOC audit and compliance. We have seen about 15% ROI.

    What's my experience with pricing, setup cost, and licensing?

    It is in the middle. It is neither very cheap nor very expensive, so I would place it in the middle.

    What other advice do I have?

    I would definitely recommend CyberArk Secrets Management, but check the ROI before investment. 

    Overall, I would rate CyberArk Secrets Management an eight out of ten.

    SJP

    Speedy secret retrieval with monitoring boosts efficiency but documentation needs enhancement

    Reviewed on Dec 20, 2024
    Review provided by PeerSpot

    What is our primary use case?

    We use CyberArk Secrets Management for applications that utilize GitLab, CI/CD pipelines, and Kubernetes. These are our primary use cases, and we are also exploring additional options.

    We implemented CyberArk Secrets Management to ensure seamless application access to the latest passwords during secret rotation, eliminating delays caused by outdated credentials. This proactive approach prevents disruptions in report execution and other critical processes, which can lead to financial losses and operational inefficiencies across various industries.

    How has it helped my organization?

    CyberArk Secrets Management is adaptable, but transitioning from existing secrets management products takes time. Integration is seamless for existing CyberArk PAM users, requiring minimal effort and resources. For those utilizing other solutions, migration to CyberArk is gradual, often starting with a pilot program. A key feature is the robust monitoring service, which allows for Syslog integration with SIEM solutions like Splunk, enhancing security monitoring capabilities.

    CyberArk effectively safeguards our financial services infrastructure. CyberArk remains capable of performing its core functions.

    It assists us in meeting compliance and audit requirements. During audits, such as SOX or others, findings often arise regarding accounts that need monitoring or remain unmanaged. By utilizing CyberArk's Privileged Access Management solution and its features, we can address these concerns and fulfill audit requirements. Consequently, by year's end, we successfully managed the targeted number of Windows and Linux accounts.

    CyberArk streamlines our workflow by automating report generation. These reports, which can be extracted regularly, are sent to management for auditing purposes, enabling them to monitor our daily progress. The system also facilitates the viewing of recorded sessions and sends logs for Secrets Management, allowing for on-demand report generation.

    CyberArk Secrets Management is a critical solution for strengthening our security posture. CyberArk was a strategic decision to enhance our security across all industries, not just financial services. Compliance is crucial whether a company handles financial data or any other type of critical information. Implementing CyberArk PAM, Secrets Management, and IGA is essential for achieving and maintaining compliance standards and protecting sensitive data.

    We recently began implementing CyberArk Secrets Management. This solution has the potential to improve our operational efficiency.

    What is most valuable?

    We are currently trying to use Conjur Cloud. One of the most important features for us is the system's performance, particularly its speed of retrieving secrets. 

    What needs improvement?

    We occasionally experience incidents that delay password injection back into the script. Additionally, we've sometimes focused on vaulting instead of actively managing passwords, which is a concern that requires further exploration.

    I'm comparing the capabilities of Conjur and Secret Service with our existing products to ensure all our use cases are covered. Some features, like dynamic tokens for Azure and GCP, are already supported by other products but not yet by Conjur. Additionally, full support for GCP Secrets Manager and CyberArk needs confirmation. While Conjur has potential, implementation was complex and required professional services. Simplifying the setup process, particularly for Conjur Edge and Conjur Cloud, would be beneficial. Improving documentation, especially for daily tasks like creating safes, would make the product more user-friendly for those new to Conjur.

    For how long have I used the solution?

    I have been using CyberArk Secrets Management for a few months.

    What do I think about the stability of the solution?


    Which solution did I use previously and why did I switch?

    I have experience with Hitachi ID systems, now known as Bravura Security, for PAM and application management credentials. Their orchestration and password randomization processes are different.

    Which other solutions did I evaluate?

    I have also evaluated HashiCorp Vault , a robust enterprise-level vault system. It's challenging to get people to adapt to new solutions like CyberArk Secrets Management . However, it will be beneficial if CyberArk continues to add features and use cases covered by other solutions.

    What other advice do I have?

    I would rate CyberArk Secrets Management a seven out of ten. It's important for CyberArk to continue adding features and covering more use cases.

    The learning curve is easy for those with prior experience in Secrets Management. However, without the CyberArk Conjur training, the concepts were often challenging to grasp. Improving the training with demos and real-world examples based on the latest use cases would be very beneficial.

    CyberArk handles maintenance for its SaaS solutions, but if components are installed in the client environment, regular maintenance, like upgrades and patching, is necessary, particularly for Windows VMs.

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    reviewer2620077

    Securely manages credentials with rotation capabilities but should have enhanced documentation

    Reviewed on Dec 19, 2024
    Review provided by PeerSpot

    What is our primary use case?

    The primary use case for CyberArk Secrets Management is rotating credentials for all service accounts, especially those managed by Puppet for file deployment. This includes rotating AWS keys and credentials used by Terraform. Additionally, we use CyberArk to rotate credentials for Bamboo, our chosen CI/CD tool.

    What is most valuable?

    CybereArk is vital for effectively managing and securing my credentials. The product is also scalable, so it can expand based on account types and application needs.

    What needs improvement?

    Improvements for CyberArk Secrets Management include enhanced documentation with more use cases and step-by-step integration guides. Thoroughly educating administrators on these aspects is crucial for successful implementation and utilization of the platform.

    For how long have I used the solution?

    I don't have much experience with CyberArk Secrets Management yet because it is still new. Most people on my team are conducting proof of concepts and tests.

    What do I think about the stability of the solution?

    So far, Secrets Management has not presented any performance challenges or issues, even though I am still expanding its scope.

    What do I think about the scalability of the solution?

    Scalability is a strong point. Secrets Management is scalable based on various account types and applications, allowing extensive use as needed.

    How are customer service and support?

    CyberArk's support team is knowledgeable and helpful, consistently responding on time. If the assigned support person is unavailable, the ticket is passed to someone else. This is a great service.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    We are finalizing the deployment of CyberArk Secrets Management. While the lower environment deployment is complete, we're facing challenges in production. Our policies require all software to be deployed via Puppet, but CyberArk lacks direct Puppet integration. To overcome this, we are working with third-party vendors to develop a solution for deploying the Conjur module to our Linux servers. This integration complexity is our current obstacle.

    What about the implementation team?

    For implementation, CyberArk engineers assisted me, and I was significantly involved within my team. I am now utilizing internal and external Puppet experts.

    What's my experience with pricing, setup cost, and licensing?

    CyberArk Secrets Management has a moderate pricing structure based on a per-tenant licensing model rather than a per-user account model like their PAM solution. This makes Conjur's cost comparatively minimal due to its one-time procurement model for modules.

    What other advice do I have?

    I would rate CyberArk Secrets Management seven out of ten. Conjur is complex and involves several integrations with different applications and accounts. Implementing it and ensuring seamless password rotations present challenges.

    The full benefits of CyberArk Secrets Management are not yet apparent as we are still in the exploration phase of this new tool. We are working to understand its functionalities and potential applications, which are proving to be slightly challenging.

    Maintenance is required and managed by administrators and engineers.

    Ifeoluwapo A.

    Identity and Access Management

    Reviewed on Mar 19, 2023
    Review provided by G2
    What do you like best about the product?
    User friendly interface and easy adaptation for a PAM solution
    What do you dislike about the product?
    Deletion limitations as deleting an account or safe from a currently synced LOB is not reflected in conjur
    What problems is the product solving and how is that benefiting you?
    It helps has a management tool for privileged account users
    View all reviews