When using IAM and PAM, CyberArk Identity is the best choice. If it is just one model, for IAM, I prefer others like One Identity. For PAM, CyberArk Identity is the best.
Furthermore, CyberArk Identity provides identity governance and gives me control over who and how access to environments occurs, offering significant confidentiality in what is accessed.
Initially, people find it challenging to adjust to these changes, however, over time, it becomes time-saving as there's no need to access each device individually. Instead, there is a single pane of glass or platform that administrators can log into to manage environments efficiently.
The partner portals are and support portals are very good.
CyberArk Identity's ability to safeguard financial services infrastructure is good. If you have your core banking application transformed, and have privileged users accessing the environment, you can control who and what is accessing where and generic accounts cannot be used. If some accesses core banking functionality, you will be able to track what a person is doing.
Its ability to help meet compliance requirements is good. It covers ISO standards. We easily integrate password policies. It helps us protect access within an organization.
It's helped us to comply with PCI DSS.
There are a lot of time savings. There's a single pane of glass to log into to access the environment. We don't have to go through individually.
We've reduced risk exposure. Instead of logging into different platforms, you just log in to one single platform. You have your resources being allocated to you. In this way, it also identifies you, with a single sign on privileges. It gives you protection in terms of not using generic accounts or administrative accounts that everybody uses. All credentials are saved in a particular system known as a vault, and only a particular port and a particular IP address can access the vault. Now, there is one way in or one way out. It doesn't create any vulnerabilities whereby people or unknown entities can enter easily.
It impacts zero trust security strategies. It prevents lateral movements in the organization. You cannot be gaining access to a privileged account.
The solution helps with operational efficiency as it provides a very secure mode of access.