Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

127 reviews
from and

External reviews are not included in the AWS star rating for the product.


    klad r.

CyberArk PAM for access management

  • January 03, 2023
  • Review provided by G2

What do you like best about the product?
Smooth workflow support for access requests
What do you dislike about the product?
HIgh initial friction to get familiar with the platform parameters used for scripts and rule definitions.
What problems is the product solving and how is that benefiting you?
We had some business-driven dynamic rules to be defined in the user onboarding flows for automatic approval and some to be approved manually.


    Asanka U.

CyberArk is so flexible and useful in so many different contexts

  • December 05, 2022
  • Review provided by G2

What do you like best about the product?
CyberArk is quite flexible and can be utilized in a variety of contexts, which is why I truly appreciate it. We can now safeguard and access our critical infrastructure in whatever way best matches their needs thanks to CyberArk's entirely cloud-based, hybrid, or on-premises environment.
What do you dislike about the product?
Sometimes implementation was problematic and required clear online documentation and guidelines, but with community support and with good product support we can clear those doubtful areas.
What problems is the product solving and how is that benefiting you?
CyberArk Privileged Access Manager help to solve the problem of privileged identity management and it helps to secure crown jewel assets from preventing ending up in the attacker's hand.


    Information Technology and Services

Cyberark PAM is great secure access management tool

  • November 15, 2022
  • Review provided by G2

What do you like best about the product?
Access management, secure, log analysis and records.
What do you dislike about the product?
None, this is a great access management tool.
What problems is the product solving and how is that benefiting you?
To improve compliance & risk management and business process outcomes also to
create internal/operational efficiencies


    Rohan Basu

Integrates with privileged threat analytics and gives alerts on login risks, risky behaviors, and other risk signs

  • May 11, 2022
  • Review provided by PeerSpot

What is our primary use case?

Our main use cases for CyberArk Privileged Access Manager are privileged access management and privileged session management. Another use case of the solution is password rotation.

How has it helped my organization?

CyberArk Privileged Access Manager improved our organization by identifying the owners of the service accounts. Each service account should be associated with an owner because without an owner, that account becomes an orphan account that nobody can take ownership of, so this means nobody would know what that account is doing. When we brought in CyberArk Privileged Access Manager, it helped us have a roadmap that allowed account ownership and account onboarding. CyberArk Privileged Access Manager gave us a roadmap, a plan to follow, and a guide on how to manage privileged access, and this is very important because we don't want privileged access to be compromised or breached.

Realizing the benefits of CyberArk Privileged Access Manager was a long journey. It was not an easy journey. It was a long journey to put things in place and get them onboarded because not all applications were compatible. It took six months to a year at least, to start the process properly.

The applications which were in Active Directory were easy, for example, it was easy to onboard the accounts and rotate the passwords because that meant only running scheduled tasks. There were a few accounts, however, where the applications weren't compatible with password rotation, particularly old applications or legacy applications that would break if the passwords were changed. To get all those sorted and to get all those in place, and explain what those changes were, took a lot of time, but for accounts that were just running scheduled tasks or services, those were onboarded easily and had their passwords rotated, particularly those which had identified owners.

What is most valuable?

One of the features I found valuable in CyberArk Privileged Access Manager is privileged session management. It's a feature that allows you to record the session, so if there's a risk, that risk can be highlighted.

I also found it valuable that CyberArk Privileged Access Manager can be integrated with PTA, and this means that it will tell you if there's a risk to the logins and signs of risk and if risky behavior is observed. It's a good feature.

Another good feature is the CPM because it helps you rotate the passwords automatically without involving the admins. It can go and update the scheduled tasks and the services. At the same time, if there's an application where it cannot do all of these, CPM will trigger an automatic email to the application owners, telling them that they should go ahead and change the password. This allows you to manage the account password that CyberArk cannot manage, which helps mitigate the risk of old passwords, where the password gets compromised, and also allows you to manage the security of the domain.

Integration is also a valuable feature of CyberArk Privileged Access Manager. It has an application access module function that allows you to integrate and manage applications, including BOT accounts. It also allows you to manage ServiceNow and many other applications.

What needs improvement?

What could be improved in CyberArk Privileged Access Manager is the licensing model. It should be more flexible in terms of the users. Currently, it's based on the number of users, but many users only log in once in four months or once in five months. It would be great if the licensing model could be modified based on user needs. We even have users who have not logged in even once.

Another area for improvement in CyberArk Privileged Access Manager is the release of vulnerability patches because they don't release it for all versions. They would say: "Okay, you should upgrade it to this point. The patches are available", but sometimes it is not feasible to do an upgrade instantly for any environment, because it has to go through the change management process and also have other application dependencies. If that can be sorted out, that would be nice.

For how long have I used the solution?

I've been using CyberArk Privileged Access Manager for around seven years now.

What do I think about the stability of the solution?

CyberArk Privileged Access Manager is a stable solution.

What do I think about the scalability of the solution?

CyberArk Privileged Access Manager is deployed on-premises in the company, so I'm unable to comment on scalability, but they do have a software as a service model, so that's scalable.

How are customer service and support?

Technical support for CyberArk Privileged Access Manager is responsive. As for their timelines for completing tickets, it would depend on the process. Sometimes it takes them less time to respond, and sometimes it takes them longer. They have different levels of support, so if level one is not able to resolve it, they escalate the issue in due time to the next level of support. They're mostly able to help.

On a scale of one to ten, with ten being the best, I'm giving their support an eight. There's always room for improvement, and in their case, in terms of support, what they could improve is their response time, especially their response to business-critical activities or issues.

Which solution did I use previously and why did I switch?

The company was probably using LockBox before using CyberArk Privileged Access Manager, but I'm not sure about that.

How was the initial setup?

Installing CyberArk Privileged Access Manager was easy. It's only the firewall you need to introduce into the environment that takes time, particularly if you're doing an on-premises model.

What was our ROI?

I saw a return on investment from using CyberArk Privileged Access Manager. It's a good privilege access management solution and identity and access management solution as a whole. It's a really good product.

The solution was definitely implemented because it saves you time and money, for example, access management and privileged access management are now automated when in the past, those processes were done manually. The new feature CyberArk DNA was also given free of charge, so that DNA tool can scan the environment for all the vulnerable accounts for password hash attacks, for accounts where the passwords were not changed. That definitely saves time, because that type of scanning would be very difficult for someone to do manually, and the report that comes out of that scan is very objective.

What's my experience with pricing, setup cost, and licensing?

I'm not involved in the purchase of the CyberArk Privileged Access Manager licenses, so I'm unable to comment.

Which other solutions did I evaluate?

I was not part of the evaluation process.

What other advice do I have?

I recently switched jobs, so I was working with CyberArk Privileged Access Manager in my previous organization, and also using it in my current organization. I'm using version 12.2 of the solution.

In terms of maintenance, it can be monitored through SCOM Monitoring, but the vault is standalone. CyberArk Privileged Access Manager can enable SNMP Traps so that the vault can be monitored automatically and it can trigger an incident to the ticketing tool the teams are using. It has the ability for automated monitoring.

My advice to others looking into implementing CyberArk Privileged Access Manager is to know their network properly. If they're doing an on-premises deployment, they should know their network properly, and they should first audit their environment in terms of the accounts they're going to manage on CyberArk Privileged Access Manager. They should also assign the owners and assign everything beforehand to help make implementation faster.

I'm rating CyberArk Privileged Access Manager nine out of ten.

Which deployment model are you using for this solution?

On-premises


    Oil & Energy

Great tool to protect your identities

  • July 30, 2021
  • Review provided by G2

What do you like best about the product?
I like the ability CyberArk gives my clients to protect their identities on both onpremises and cloud.
What do you dislike about the product?
The API could be better. You need to understand certain fields, because they're different in API than in Web.
What problems is the product solving and how is that benefiting you?
We are protecting service accounts in our clients. Thanks to CyberArk, they no longer hardcode them.
Recommendations to others considering the product:
Read API documentation.


    Srikanth K.

The Best Password Security Tool for both To Handle and to Secure

  • December 18, 2020
  • Review provided by G2

What do you like best about the product?
I like the PSM(Privileged Session Manager) to monitor the every connectivity of the user in the backend and especially the CPM(Central policy manager) to handle the password, based on required and pre-defined platforms
What do you dislike about the product?
It will be a bit-difficult for the begineer to start working/learning the tool and to get-hands on.
ONCE it comes,
Then we can play/develop with the tool
What problems is the product solving and how is that benefiting you?
We used to integrate Cyberark with all other internal application, and monitor the Session, if any unknown activity goes, depending on the request.

At the same time, we onboard the account and safes to ful-fil the server and serves the admin purposes technically in the tool
Recommendations to others considering the product:
THe Best and N0.1 Password Security and management tool in the Market and as well as IT


    Daniel L.

The Leader in PAS solutions but needs improvement in granular customizations

  • October 20, 2020
  • Review provided by G2

What do you like best about the product?
It's a full-featured solution with numerous third-party integrations. Tools such as the DNA scans help provide visibility to organizations on how badly a PAS solution is needed but also helps to provide the information needed to prioritize which accounts need to be protected first.
What do you dislike about the product?
The solution is complex and requires professional services to just deploy the solution. Although documentation is provided to deploy in-house, it is sometimes spotty and requires knowledge of the product to properly deploy based on your environment. Any upgrades to new versions and any changes to the architecture requires professional services as well. And there isn't much resources to help identify your use cases other than the obvious ones. As you implement the solution, new use cases will probably pop up and may require changes that you won't be able to do in-house.
What problems is the product solving and how is that benefiting you?
CyberArk PAS helps us secure our most privileged accounts. It also helps to automatically rotate passwords and securely store them in the vault. It can also store other passwords and may eliminate the need for a separate password management solution but that is based on your company's use case.
Recommendations to others considering the product:
Make sure to take into account all the use cases you can think of BEFORE evaluating a solution. Talk to your stakeholders and the different teams that would be affected by this. Make sure you have full organizational buy-in from the top down so everyone knows what changes to expect.


    Security and Investigations

Cyber Ark review

  • June 30, 2020
  • Review provided by G2

What do you like best about the product?
For PAS application: That it's easy to scale and have redundancy; simply add another server behind your load balancer. For EPM: It’s highly adjustable and flexible, can be tailored for large ranges of uses.
What do you dislike about the product?
For PAS Application: The CPM component is not easily to scale. This, however, is a minor point. For EPM Application: * Performance issues with large deployments. Requests could repeatedly fail or refuse to execute at all when dealing with large pool of data. For example reports sometimes just refuse to generate. * Creation of computer groups with 57k machines is nearly impossible, because system just doesn’t record creation or modification of a group. According to documents solution should easily handle 100k endpoints, but even half of this number gives it a pause.
What problems is the product solving and how is that benefiting you?
We have been deploying CyberArk to address the needs of managing secrets into our applications, and then after strong adoption by our R&D team, it has been pushed into production and infrastructure. The solution is addressing all our needs, and cover future expectations such as managing selective remote access (Vendor - Alero) or our move to IaaS with Conjur, or SaaS for Corporate Applications (PSM for Cloud)
Recommendations to others considering the product:
Privilege management activity is a big task in an organization. It should be sized well, and staged objectives needs to be defined. Managing all privileges accounts is a wide deployment in a large IT environment, and it takes times and resources. The human factor is therefore more important than the technology. Cyberark is a great technology but a lot of change management is required.


    Murat H.

Intense Security

  • January 08, 2020
  • Review provided by G2

What do you like best about the product?
CyberArk gives you to control all clients smoothly and consumes less system resources. I assume this is the one solution that we need.
What do you dislike about the product?
Sometimes it's hard to manage group privileges.
What problems is the product solving and how is that benefiting you?
We are solving app control for each clients.


    Kevin T.

Perfect solution for Enterprise Privileged Access Management(PAM)

  • October 01, 2019
  • Review provided by G2

What do you like best about the product?
Cyberark is the most complete and features rich solution which I have used to date when it comes to Privileged Access Management(PAM). The access can be granted at a very granular level as well. The integration with Active Directory(AD) is a huge bonus to maintain all the IDs of the employees of an enterprise and what level of security is given to them on various fronts.
It has been working very well for us because we have never ever seen a hacking incident or identity theft or eves dropping happening in the enterprise from the time we have introduced Cyberark.
What do you dislike about the product?
The website is not the fastest and it takes time to load ans sometimes even after you have verified your credentials, it still times out. This is something which I will like to see an improvement upon.
What problems is the product solving and how is that benefiting you?
Cyberark has been a real success story for us because we have integrated all the users and FRAM servers with Cyberark. OS, the password gets changed automatically and only the admin has the access to see the credentials of those FARM servers and login only in case of any issues occur.
The clients are at much more ease now that we have Cyberark into the picture. It has really helped to grow our business by making it more secure and available too.
Recommendations to others considering the product:
It is a brilliant solution for Enterpsie level access management and provisoning with less overheads and admin work. You can be assured for complete safety of your data and your passwords will be regularly changed based on the policies which you apply on them.