Listing Thumbnail

    CyberArk Secure Cloud Access

     Info
    Sold by: CyberArk 
    Deployed on AWS
    Free Trial
    CyberArk Secure Cloud Access implements Zero Standing Privileges to secure identities at every layer of your multi-cloud environment without impacting native cloud user experience. Cloud admins, start a 30-day free trial today to protect cloud access and meet compliance requirements in a native, secure manner.

    Overview

    Play video

    CyberArk Secure Cloud Access, part of the CyberArk Identity Security Platform, delivers Just-in-Time (JIT) access with zero standing privileges, allowing developers secure access across AWS, Azure, and GCP environments without interruption. Designed with a developer-friendly approach, CyberArk dynamically provisions access to reduce risk and maintain developer productivity.

    The Critical Need for Developer Access Security With the rise of digital transformation, overprivileged developer identities are increasingly targeted in attacks, often leading to prolonged breaches and data theft. Traditional standing access in cloud environments opens paths for attackers to misuse credentials, creating risk. CyberArk mitigates this by enabling JIT access, reducing the attack surface and safeguarding organizations from long-term breaches.

    Developer-Centric Access for Enhanced Efficiency CyberArk recognizes the operational demands developers face. Developers can launch sessions natively, using their own federated identity across cloud services, APIs, and infrastructure without jump servers or extensive approvals. This seamless approach enhances productivity while preserving security.

    Key Benefits for Developers Zero Standing Privileges (ZSP): Developers get temporary, session-based access without standing permissions, reducing unauthorized access risk while maintaining workflow continuity. Time, Entitlement, Approval (TEA) Model: CyberArk's TEA model ensures developers receive access when needed, minimizing delays in time-sensitive situations and restoring functionality faster. Attribute-Based Access Control (ABAC): Permissions are granted based on identity, role, and context, aligning with security requirements without compromising developer efficiency. Prioritizing Developer Experience CyberArks approach offers:

    Native Tool Access: Developers use familiar tools like SSH clients and web consoles directly, reducing fatigue and allowing agile response times. Fast Incident Resolution: On-demand access for critical scenarios helps minimize downtime, accelerating issue resolution. Centralized Access Across Clouds: With a unified platform, developers manage access to all environments consistently, boosting speed and productivity. Empowering Developer Velocity and Security CyberArk enables a frictionless experience by securely granting JIT access, preventing delays in high-pressure situations. By allowing developers native access to cloud consoles, CyberArk reduces credential management burdens and risk, supporting developer velocity and secure innovation.

    Adaptive Controls for Multi-Cloud Security CyberArk's Insight to Action framework centralizes oversight of access rights across cloud environments. Integrated with AWS IAM, AWS IAM Identity Center, Slack, and ServiceNow, it simplifies privilege management, enhancing both security and operational efficiency.

    Protecting Against Identity-Based Threats CyberArk's ZSP and JIT access model ensures no standing credentials, reducing credential exposure and unauthorized access. Layered, identity-based controls help secure developer access without hindering productivity, empowering continuous innovation.

    Measurable Benefits with CyberArk Secure Cloud Access Accelerated Cloud Transformation: Provides developers secure, JIT access to SaaS, APIs, and infrastructure in a unified, compliant platform. Efficient Compliance Management: Detailed audit trails and ITSM tool integrations ensure secure scaling and compliance. Enhanced Developer Efficiency: JIT access via the TEA model streamlines access, reducing delays and improving user experience. CyberArk: Secure, Fast Developer Access for Innovation The CyberArk Identity Security Platform ensures secure, JIT access at cloud speed, offering the only identity security solution with Zero Standing Privileges. It reduces attack risks, drives operational efficiency, and supports developer innovation.

    For custom pricing or offers, contact AWS-Marketplace@cyberark.com .

    Highlights

    • Provide Temporary Elevated Access, Just-in-Time with Zero Standing Privileges to Resources across your cloud estate
    • Secure, Native access requiring no change in workflow, tooling or configuration for end users. This is provided to accelerate adoption
    • Access workflows provide a rapid and clear route to elevated entitlements with close integration to ITSM and ChatOps tooling

    Details

    Categories

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    CyberArk Secure Cloud Access

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Secure Developer Users, Standard Edition, QTY 5 users
    Secure Cloud Access - 5 users: Multi-cloud, zero SP, CLI/web, monitor
    $2,400.00

    Vendor refund policy

    Contact CyberArk for support related questions: www.cyberark.com/customer-support/ 

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Contact CyberArk for support related questions: www.cyberark.com/customer-support/  Contact CyberArk for support related questions: www.cyberark.com/customer-support/ 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By BeyondTrust Corporation
    By Barracuda Networks

    Accolades

     Info
    Top
    10
    In Financial Services
    Top
    100
    In Infrastructure as Code

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    5 reviews
    Insufficient data
    Insufficient data
    19 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Zero Standing Privileges
    Dynamically provisions temporary, session-based access across multi-cloud environments without persistent permissions
    Attribute-Based Access Control
    Implements granular permission management based on identity, role, and contextual attributes for secure access
    Multi-Cloud Integration
    Supports unified access management across AWS, Azure, and GCP cloud environments with native tool compatibility
    Just-in-Time Access Model
    Enables on-demand, time-limited access to cloud resources with automated entitlement and approval workflows
    Identity Security Framework
    Provides layered identity-based controls to prevent unauthorized access and reduce credential exposure risks
    Identity Threat Detection
    Advanced discovery and intelligence system for detecting identity-based threats across infrastructure
    Privileged Access Management
    Comprehensive control and management of privileged passwords, accounts, credentials, and sessions for human and machine identities
    Remote Access Security
    Granular control, management, and auditing of privileged remote access for employees, vendors, developers, and cloud operations engineers
    Endpoint Privilege Control
    Dynamic least privilege enforcement across Windows, macOS, Linux, and mobile platforms to prevent malware and unauthorized access
    Cloud Entitlement Management
    Cross-cloud visibility of access permissions, detection of account permission anomalies, and guidance for privilege optimization
    Zero Trust Access Model
    Implements a dynamic access control framework based on continuous verification of user and device identity before granting resource access
    Multi-Cloud Resource Protection
    Provides secure access across AWS, on-premises, and multi-cloud environments without traditional VPN infrastructure
    Contextual Access Control
    Applies granular access rules and conditions that dynamically evaluate user and device trust before permitting workload access
    Identity Verification Mechanism
    Requires accessing entities to prove their authorization through comprehensive authentication and validation processes
    Remote Access Security Framework
    Enables secure, conditional access to corporate applications and cloud workloads with reduced attack surface exposure

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    6 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    AtulGujar

    Ensures high availability and robust security for critical sectors

    Reviewed on Apr 07, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I use CyberArk Secure Cloud Access  for managing privileged access and maintaining security. My work involves secure tunnels between on-premises and the cloud. I create secure environments using VPN, CPM , and PSM servers both on-premises and in the cloud, and handle installations and configurations across a variety of systems including physical, cluster, and virtual servers.

    What is most valuable?

    CyberArk Secure Cloud Access  offers high availability, ensuring no downtime as it is cloud-based. The solution provides robust security features essential for financial and banking sectors to avoid network and connectivity issues or security breaches. CyberArk's integration capability is highly valuable, as it allows seamless management of privileged accounts across various databases, network devices, and operating systems, unlike other products that require additional API development.

    What needs improvement?

    CyberArk Secure Cloud Access has limitations in support for on-premise teams. When issues arise with the VPN portal or the frontend, the admin team must directly engage the vendor, which can be time-consuming. It is important for critical support to respond within fifteen to twenty minutes to minimize business impact.

    For how long have I used the solution?

    I have been using CyberArk products for over eight years. My experience covers several versions, most recently from version 10.5 to the latest 14.4, and I have been involved in the total implementation, installation, and configuration for more than forty clients.

    What was my experience with deployment of the solution?

    Technically, CyberArk's deployment is efficient, but sometimes for critical cases, the response time can be delayed. There is a need for immediate vendor support in urgency, especially for severe issues that impact the business significantly.

    What do I think about the stability of the solution?

    CyberArk Secure Cloud Access ensures high availability with its cloud infrastructure, minimizing downtime. It is highly stable and reliable.

    How are customer service and support?

    The technical support from CyberArk is generally good. They adhere to SLAs, and most issues are resolved effectively. However, for critical cases, support response needs to be quicker. Sometimes, contacting the right team for severe issues can take longer than preferred.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial setup of CyberArk Secure Cloud Access is straightforward, given its proactive communication and support in terms of providing updates and new features regularly through client conferences.

    What about the implementation team?

    I am involved in implementing and configuring CyberArk across numerous setups, including integrating it with third-party solutions like Qualys and SailPoint.

    What's my experience with pricing, setup cost, and licensing?

    I am not directly involved in pricing aspects, but I am aware that CyberArk is considered costly compared to other products. Nonetheless, its comprehensive security and functionality justify its price.

    What other advice do I have?

    Overall, I would rate CyberArk Secure Cloud Access around eight or nine. I recommend CyberArk Secure Cloud Access because it offers unmatched security features, essential for critical sectors like finance and banking, despite being more expensive than other solutions. I give it a rating of 8 out of 10.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Information Services

    Best PAM based Application

    Reviewed on Jan 29, 2025
    Review provided by G2
    What do you like best about the product?
    The security of the accounts, safes or servers with user friendly GUI.
    What do you dislike about the product?
    More features to be added to the new GUI
    What problems is the product solving and how is that benefiting you?
    It is helping users secure there servers and privelege access to those servers as management application.
    Lovepreet S.

    Good for Authentication and security Purpose

    Reviewed on Jan 27, 2025
    Review provided by G2
    What do you like best about the product?
    It's Identity User Portal which helps apps to be open from one window no need to login everytime in every other app. Also can add your mobile as authenticator device with push notifications.
    What do you dislike about the product?
    Nothing so far I have experienced, its working as desired.
    What problems is the product solving and how is that benefiting you?
    It's solving my problem to remember Login username & passwords and login URL's which is a hassle to keep some where. It's displaying every app on the portal which I can acces by single click.
    Adarsh M.

    Helpful to use

    Reviewed on Mar 23, 2024
    Review provided by G2
    What do you like best about the product?
    Its security with the cyber attacks and threats is good. Also its ease of use.
    What do you dislike about the product?
    Though it's a cloud access so sometimes it's required high bandwidth and internet connectivity to access and control the system.
    What problems is the product solving and how is that benefiting you?
    To secure our application product we used cyberArk.
    Cruz S.

    Secure Your Cloud Platforms Using CyberArk Cloud Entitlements Manager

    Reviewed on Sep 25, 2023
    Review provided by G2
    What do you like best about the product?
    Cross platform support, i.e all the market leader cloud service provider is supported.
    What do you dislike about the product?
    Subscription model, which entitles to purchase license based on no. of workspace. Doesnt think it will help for large organisation.
    What problems is the product solving and how is that benefiting you?
    It actually scans my entire workspace, and gives me the insight or nalaytics of how the seurity breach can be mitigated.
    View all reviews