Listing Thumbnail

    CyberArk Workforce Password Management

     Info
    Sold by: CyberArk 
    Deployed on AWS
    Protect from credential-based threats and securely store, manage and share business application passwords.

    Overview

    CyberArk Workforce Password Management is an enterprise-focused password management solution that helps companies overcome the unique user authentication and auditing challenges presented by business apps requiring an individual username and password credentials. With Workforce Password Management, users can add applications to a centralized web portal, access apps with a a single click, and securely share credentials and secured items with internal teams. Behind the scenes, passwords are securely stored in the CyberArk Identity Cloud or CyberArk Vault providing security teams granular control and visibility.

    Highlights

    • Control how credentials are managed, stored and shared across your organization. Restrict which users can view, edit or share credentials and specify the duration of shared access. Automatically transfer ownership when the primary owner leaves the organization.
    • Audit activity and demonstrate compliance with visibility and reporting. Built-in reports simplify audits and provide a comprehensive history of credential updates and access events.
    • Reduce friction for end-users and as a result, reduce risk for your organization. Simplify how users access business apps and reduce password fatigue and bad password hygiene for your employees. Workforce Password Management easily captures credentials when new accounts are created and autofills fields at login.

    Details

    Categories

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    CyberArk Workforce Password Management

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Workforce Password Mgmt
    Workforce Password Mgmt - 200 users
    $14,400.00

    Vendor refund policy

    For refund policy, visit <www.cyberark.com/terms-service-saas/ >

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Ensuring your CyberArk Workforce Password Management is up to date and running efficiently is a priority. If you encounter a technical problem, contact CyberArk support 24x7, using our ticketing system at https://cyberark-customers.force.com  - Phone and email support are also available. Further details are available at <www.cyberark.com/customer-support/#contact-supportContact >

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By BeyondTrust Corporation
    By Barracuda Networks

    Accolades

     Info
    Top
    10
    In Financial Services
    Top
    100
    In Infrastructure as Code

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    1 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    19 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Credential Management
    Centralized web portal for managing and storing business application credentials with granular access controls
    Access Control
    Ability to restrict user permissions for viewing, editing, and sharing credentials with configurable access duration
    Secure Password Storage
    Passwords securely stored in Identity Cloud or dedicated vault with enterprise-level protection mechanisms
    Automated Ownership Transfer
    Automatic credential ownership transfer when primary credential owner leaves the organization
    Compliance Reporting
    Built-in audit reporting system providing comprehensive history of credential updates and access events
    Identity Threat Detection
    Advanced discovery and intelligence system for detecting identity-based threats across infrastructure
    Privileged Access Management
    Comprehensive control and management of privileged passwords, accounts, credentials, and sessions for human and machine identities
    Remote Access Security
    Granular control, management, and auditing of privileged remote access for employees, vendors, developers, and cloud operations engineers
    Endpoint Privilege Control
    Dynamic least privilege enforcement across Windows, macOS, Linux, and mobile platforms to prevent malware and unauthorized access
    Cloud Entitlement Management
    Cross-cloud visibility of access permissions, detection of account permission anomalies, and guidance for privilege optimization
    Zero Trust Access Model
    Implements a dynamic access control framework based on continuous verification of user and device identity before granting resource access
    Multi-Cloud Resource Protection
    Provides secure access across AWS, on-premises, and multi-cloud environments without traditional VPN infrastructure
    Contextual Access Control
    Applies granular access rules and conditions that dynamically evaluate user and device trust before permitting workload access
    Identity Verification Mechanism
    Requires accessing entities to prove their authorization through comprehensive authentication and validation processes
    Remote Access Security Framework
    Enables secure, conditional access to corporate applications and cloud workloads with reduced attack surface exposure

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4
    1 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    100%
    0%
    0%
    0%
    1 AWS reviews
    |
    16 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    DerrickAkankwasa

    Reduces IT team's workload while offering comprehensive identity security features

    Reviewed on Sep 09, 2025
    Review provided by PeerSpot

    What is our primary use case?

    The solution is mostly used for financial services.

    How has it helped my organization?

    The solution covers all key pillars of Identity security and governance. It reduces IT team workload by managing employee transitions, allocating rights, implementing least privilege, and ensuring people have only the necessary access rights. The role-based access and secure resource access principles are automated within organizations, especially when integrated with HR systems, enabling quick resource provisioning and decommissioning.

    Once the solution is deployed, the customer can immediately see benefits. Typically, the first phase involves securing high-risk areas. Once the protection for privileged access identities is in place, the customer can then focus on securing the rest of the workforce, as well as protecting sensitive communications between machines, endpoints, and workstations. The time to realize value from this solution is quite short because it is a comprehensive solution. As soon as it is implemented, it fundamentally changes how users access systems, providing immediate security benefits. In summary, the value becomes apparent right away.

    What is most valuable?

    CyberArk Identity  offers Single Sign-On , Adaptive MFA, Web Password Manager, and Secure Web Sessions for recording sessions from web applications. It also provides federated services, Directory Service integration with popular IDPs, and management of joiners, leavers, and movers in an organization.

    What needs improvement?

    They have been working to improve areas such as Identity Governance  and Assurance (IGA ), but integration with new acquisitions into a single stack could be enhanced. While CyberArk Identity  is a leader in Identity Security, the integration of multiple components could be improved.

    I would suggest focusing on the integration of the multiple components. Currently, we have a unified platform, but with the recent acquisitions, I would like to see more seamless integration of those new entities. Additionally, I’m curious to see how the recent acquisition by Palo Alto will play out. I am interested in understanding how both companies can benefit from each other moving forward.

    Additional improvements could include more out-of-the-box plugins for key systems. Though they are the largest privileged access company with numerous integrations, coverage could be expanded for certain database clients and other systems.

    For how long have I used the solution?

    I have been using CyberArk Identity for a year and a half.

    How are customer service and support?

    Their support is very good, with a huge community. I would rate it as a nine out of ten.

    How would you rate customer service and support?

    Positive

    What's my experience with pricing, setup cost, and licensing?

    The subscription licensing model, which provides identity features within the privileged access license, is quite affordable for most customers. The full stack available through one subscription license works particularly for customers in Africa, where the acquiring rate remains healthy.

    What other advice do I have?

    I would rate CyberArk Identity an eight out of ten.

    VishalPawar

    UI simplification and robust support enhance user provisioning and authentication efficiency

    Reviewed on Aug 29, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We are using CyberArk Identity  for user provisioning, and we have integrated multiple applications, most of them being SAML-based authentication ones. 

    We are also provisioning users to target applications and using CyberArk Identity  as an authentication method for two-factor authentication.

    I have worked on multiple projects where we have integrated external IdPs with CyberArk Identity. We have also implemented AD integration to get users from Active Directory to CyberArk Identity. We are using the reporting functionality and role-based access control. 

    We have created several roles for one client where I was working. It was an all-suite ISPS model that CyberArk has where CyberArk Identity, Privileged Cloud, and all those applications were present. In this case, we were using roles from CyberArk Identity to grant users access to their respective safes in the Privileged Cloud.

    What is most valuable?

    The UI is very simplified, and the documentation of CyberArk Identity is very crisp and clear. The support of CyberArk Identity is also really good. 

    From the support perspective, there is an excellent feature for identity verification. 

    When someone calls with identity issues, CyberArk Identity has provided one of the best features where we can use MFA verification. It sends a code to the user and validates the caller.

    CyberArk Identity can be integrated with applications such as Secure Hub, Secrets Hub, Conjur, and Privileged Cloud. However, getting usage reports for specific applications is difficult. Tracking user activity across different integrated applications is challenging as the logs don't provide detailed information about which application users accessed.

    What needs improvement?

    The reporting functionality is somewhat complicated. While I would rate CyberArk Identity and Okta on the same level, Okta's reporting is crisper and clearer. For CyberArk Identity, you need knowledge of their scripting language to pull different sets of reports. 

    Though the out-of-the-box reports are good, they should simplify the reporting process to make it easier to pull all reports. The documentation for the reporting functionality is not very clear, which creates conflicts. 

    Additionally, CyberArk Identity needs to enhance features such as import scheduling and document clarity for new aspects such as Flows.

    For how long have I used the solution?

    I have been using CyberArk Identity in my career for almost four years.

    What do I think about the stability of the solution?

    As part of maintenance, we haven't faced any downtime with CyberArk Identity. If there are any outages, CyberArk is responsible, and they usually address them very quickly. The services were operational 24/7. 

    Previously, we faced some issues where when users were provisioned and we tried to delete them, the entry was deleted from the back end, however, a ghost entry still existed in CyberArk Identity. We did not have an option to delete that particular user, which caused issues when trying to provision the same user again from AD.

    How are customer service and support?

    The quality of support is really good. They respond immediately when requests are raised, and they are always available for priority one tickets. The only requirement is having access to their community portal to raise cases. The support is comparable to other SaaS products such as Okta.

    How would you rate customer service and support?

    How was the initial setup?

    The initial deployment was straightforward. CyberArk provides the tenant, and the documentation for integrating with Active Directory is clear. You need to build the server and set up the agent. The AD integration itself takes about ten minutes, but the complete process, including server build and approvals, takes a couple of days. If all resources are ready, the actual integration is very straightforward and takes only five to ten minutes.

    What about the implementation team?

    We are partners providing services to other clients. I am an implementation engineer responsible for designing, architecting, and deploying solutions for clients.

    What's my experience with pricing, setup cost, and licensing?

    I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences their decision to choose the solution.

    Which other solutions did I evaluate?

    Okta is a more mature product compared to CyberArk Identity. Policies and customization are easier with Okta. Integration with different applications through the Okta Integration Network is straightforward, with clear guides and steps. CyberArk Identity could improve in these areas. The main difference is in the UI and some features. 

    The reporting functionality in Okta is superior. In Okta, you can control imports and manually import users from AD, applications, or CSV files. These options and the ability to schedule periodic imports are not available in CyberArk Identity.

    What other advice do I have?

    Comparing CyberArk Identity with products such as Ping, Okta, and RSA, CyberArk Identity still needs product development, as Okta offers additional features. Some features of CyberArk Identity are excellent, however, Okta is more user-friendly. The reporting functionality and Flows are areas for improvement. Since Flows is a new product, it needs to mature. They should conduct training, educate people, and provide clear documentation for better utilization.

    In the Identity user portal, you can create secure notes, upload passwords or keys, and create bookmark applications. We have encountered some glitches when sharing applications with others, where users face issues despite having correct permissions.

    I rate CyberArk Identity eight out of ten.

    RiaanDu Preez

    Gaining access and provisioning on-demand has become intuitive and efficient

    Reviewed on Aug 27, 2025
    Review from a verified AWS customer

    What is our primary use case?

    My use case for CyberArk Identity  involves multiple reasons: for identity to gain access to the clients' environments, to provision on-demand access, and to provide services via the Access Manager.

    What is most valuable?

    I find the CyberArk Identity  portal quite intuitive; it has changed a lot over the last year and a half. 

    If you think logically and understand your environment, it is easy to establish a suitable setup for yourself and all your vendors. I did see an impact on operational efficiency with CyberArk Identity. 

    If you look at all the technical requirements to set up a VPN or an access management tool, where you need to integrate four, five, or six different services with the CyberArk side, it is significantly easier. You provision a server on the inside and simply assign the services allowed from the outside by ticking a box to grant access. The person can then either scan a QR code or receive an email to log in.

    CyberArk Identity has indeed helped reduce the mean time to detect; it has also aided in troubleshooting by allowing logs to be extracted and sent to a correlation engine, such as QRadar, for notifications or alerts. It also helps in preventing attacks, as someone trying multiple times to log in, and the trigger on whatever login is used aids in maintaining a quick view of what is happening.

    What needs improvement?

    Room for improvement for CyberArk Identity might be on the support side, as they constantly improve with new features and remove redundant ones, integrating multiple steps into a single one for easier use; however, this is not just CyberArk Identity, as many vendors start with basic troubleshooting services without recognizing that knowledgeable users often reach out after exhausting those options.

    For how long have I used the solution?

    I have been working with CyberArk Identity for coming on four years now.

    What do I think about the stability of the solution?

    The solution's stability depends on your connectivity most of the time, so if you've got a bad network, it will not be stable, but with a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.

    What do I think about the scalability of the solution?

    CyberArk Identity is definitely a scalable solution; it all depends on the money that you have, as with anything else.

    How are customer service and support?

    I would rate technical support from CyberArk a nine out of ten; there's always space for improvement.

    How would you rate customer service and support?

    How was the initial setup?

    After implementing CyberArk Identity, in a big implementation, it took about four months for my organization to see time to value, while in a smaller implementation, it was a month.

    What's my experience with pricing, setup cost, and licensing?

    My experience with the pricing of CyberArk Identity has been good, as we've got a good relationship with the team, whether in South Africa, where I am or globally; we maintain a strong relationship and have been competitive against any other identity solutions.

    What other advice do I have?

    My experience of working with CyberArk solutions is quite extensive. With CyberArk tools, I have experience working with Privileged Access, Identity Access, and Secrets Manager, although with Secrets Manager not as much, but the other two quite extensively.

    My relationship with CyberArk is as a partner. I purchased CyberArk Identity through both the vendor and AWS Marketplace , as it depends on what the client wants: through the vendor for purely bespoke installation or architecture and AWS  for ease of use.

    I would rate CyberArk Identity a nine out of ten overall. 

    I understand that different people have different requirements, which might mean they don't experience it the same way as I do.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    JosephAndiwo

    Best Solution to increasing workflow security

    Reviewed on Aug 06, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Essentially, our use case for CyberArk Identity  involves automating customer interactions and engagement, as well as onboarding new clients.

    Being in retail and marketing, CyberArk Identity  has made it easier to onboard new customers online, making the process much faster and efficient.

    Interaction with customers has improved greatly through CyberArk Identity software through automation of most of our processes, thus freeing our time to concentrate on other key strategic activities of the company. 

    How has it helped my organization?

    Cyber Identity has improved our workflow processes and seamlessly enhanced our client engagement, as well as streamlining our operations and interdepartmental collaboration. Tasks we used to perform manually are now automated, thus increasing efficiency and productivity.

    Additionally, we no longer have any fear of our data being infiltrated by an unauthorised person because of the security features it comes with. Tracking processes, workflows and audit trails works perfectly well.

    It has a user friendly interface and dashboard.

    What is most valuable?

    The best feature of CyberArk Identity  is the single sign-on (SSO ) feature that offers quick and one-click access.

    The second feature that I enjoy so much is the endpoint privilege security, which safeguards our sensitive information and protects against security threats.

    One benefit of the software is the enhanced security. It provides strong authentication, improving our operations and access controls. Additionally, it streamlines operational processes, reducing the administrative burden on our IT experts and security teams.

    The value of the software was immediate, especially for the onboarding of clients.

    What needs improvement?

    One area for improvement is the complexity of learning how to use the software for new users. It requires training.

    For how long have I used the solution?

    I have been using CyberArk Identity for two years.

    What do I think about the stability of the solution?

    Very stable.  Our data is safe with CyberArk Identity.

    What do I think about the scalability of the solution?

    Very positive and promising. I give it a nine.

    How are customer service and support?

    Satisfactory and knowledgeable.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have not used many other solutions to compare it to.

    How was the initial setup?

    Straightforward.

    We spent 2-3 weeks deploying.

    What about the implementation team?

    Vendor.

    High.

    What was our ROI?

    We have saved over 50% of our time to concentrate on other strategic activities since we deployed CyberArk Identity.

    What's my experience with pricing, setup cost, and licensing?

    The pricing for the solution is fair.

    Which other solutions did I evaluate?

    No

    What other advice do I have?

    I would highly recommend this product without hesitation due to its numerous advantages, features, and benefits, such as unified access management and high-level security.

    I am a user. I am available for reference anytime.

    On a scale of 1 to 10, I give CyberArk Identity 9.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Google
    S Azeem

    Eases regulatory compliance and streamlines administrative tasks with efficient identity and password management in sensitive sectors

    Reviewed on Jun 05, 2025
    Review provided by PeerSpot

    What is our primary use case?

    CyberArk Identity  is mainly used for accessing servers, partition management, and rotating passwords, especially in sensitive sectors such as banking and to protect patient data. It's crucial for complying with regulations and ensuring that administrative tasks such as encryption key management are streamlined.

    What is most valuable?

    CyberArk Identity  provides an easy identity portal, single console, log capture for GRC  compliance, and efficiently rotates passwords unknown to users, enhancing security. These features aid in reducing the attack surface by blocking unauthorized access and preventing exposure of internal solutions in sectors such as banking.

    What needs improvement?

    Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management.

    For how long have I used the solution?

    We have been working with CyberArk Identity for more than five years. Previously, I worked with other PAM management tools. Currently, most customers are choosing it as a premier product, which is why we are focusing more on CyberArk Identity.

    How are customer service and support?

    They charge reasonable money for the features they provide. The price is reasonable for the product.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    While Arkon PAM is a competitor, that product is not as good nowadays. CyberArk Identity is at the top. When it comes to premium products, CyberArk Identity stands alone.

    How was the initial setup?

    The setup process for CyberArk Identity is singular, but it differs for all customers. Customers provide the data for implementation, based on which we receive payment. From a product perspective, it's easy, but we need to gather customer data and implement according to their requirements.

    Which other solutions did I evaluate?

    Other vendors include CrowdStrike and SentinelOne.

    What other advice do I have?

    Customers in the banking sector don't expose what solutions they have inside their systems for security reasons. My overall rating for CyberArk Identity is nine out of ten.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    View all reviews