Good reporting and MFA with easy integration capabilities
What is our primary use case?
In my organization, we are using CyberArk Privileged Access Manager to enhance the security of an organization's critical systems, mainly by securing privileged accounts (e.g. administrator passwords, SSH keys, and API tokens).
We are also using Cyber-Ark for access control by ensuring that only authorized personnel can access privileged accounts and sensitive systems.
very important for us is also Session Recording and Monitoring. We can record and monitor privileged user sessions in real time for auditing purposes.
How has it helped my organization?
CyberArk Privileged Access Manager significantly improved our organization's security. Mainly, it has enhanced our ability to secure privileged accounts. Centralized management of identities ensures that credentials are stored securely. Also, the automated rotation of passwords reduces the risk of leaks.
The session recording feature adds great value and helps with auditing administrative activities.
CyberArk PAM can be easily automated, which saves a lot of time and administrative effort.
What is most valuable?
For our organization, the most valuable features of CyberArk PAM are:
- Credential Management. The automation of the retrieval and injection of credentials into sessions, and automation of password rotation.
- Session Recording. It gives us the possibility to record privileged user sessions for auditing and compliance purposes.
- Ease of integration. CyberArk can by integrated with multiple systems and applications.
- The possibility of using Multi Factor Authentication (MFA) which increases security
- Reporting module. This allows us to generate reports based on session activity
What needs improvement?
Cost management. There should be more models and licensing plans for this software. They should also be flexible, allowing you to purchase selected features at a favorable price.
User Experience. The current interface is OK, however, sometimes it is not very intuitive. There is also no possibility of advanced modification and adaptation to your own needs and requirements.
Performance. The performance of the application could be a bit better, especially in the case of remote sessions - delays in remote sessions can be annoying.
For how long have I used the solution?
I've used the solution for about five years.
Which deployment model are you using for this solution?
On-premises
Excellent products with flexible design to meet any sites company requirements
What do you like best about the product?
Flexible architect design and powerful function with lots of plugins in market place.
What do you dislike about the product?
Configuration is a bit too compliated. It will need a good experienced team to support it.
What problems is the product solving and how is that benefiting you?
Secure the accounts and automate the process realting to accounts.
Best of Breed for PAM
What do you like best about the product?
Very advanced security. Wide selection of marketplace integrations.
What do you dislike about the product?
It is complex to install and upgrade. Vendor engagement is a must for install.
What problems is the product solving and how is that benefiting you?
Securian our credentials, isolated sessions, application credential retrievals, vendor access.
Easy to secure, control, and monitor privileged access on highly critical networks
What is our primary use case?
Within our organization, our security requirements, which are set by our customers, require CIS compliance. Those requirements mandated securing privileged passwords with encryption, both in transit and at rest. CyberArk PAM was selected as our solution, and CyberArk's Professional Services team conducted the initial installation and implementation.
Three years later, I was tasked with implementing the product more fully, integrating more of the out-of-the-box privileged password change management automation features of the product within our environment.
How has it helped my organization?
The out-of-the-box functionality, Windows OS Privileged local account password change management, was the first automation feature implemented, and by itself, the automation reduced the man-hour requirement for quarterly local privileged password change management enough to provide a complete ROI on the initial licensing investment.
Continued implementation of more of the out-of-the-box PAM functionality continues to produce man-hour savings, which frees up our security operations group to have more time to monitor, investigate, and resolve potential security issues on the network.
What is most valuable?
Our implementation is air-gapped from the outside world, and as such, we utilize a completely on-prem solution. Our highest risk is from privileged insiders, and CyberArk's answer to this challenge was the implementation of a Privileged Session Manager (PSM). With PSM, we were able to secure, control, and more importantly, monitor privileged access to highly critical network servers by using PSM to manage accounts and create detailed session audits and video recordings of all IT administrator privileged sessions on our most critical servers. The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices.
What needs improvement?
CyberArk PAM is a very broad product as everyone's requirements for implementation are different. In our particular case, the initial implementation was planned and developed by people who didn't know our specific network requirements, so the initial implementation needed to be tweaked over time. While this is normal, at the time all these "major" changes required CyberArk professional services to come in-plant and "assist" with the changes.
Over time, the CyberArk product team has made this process simpler and has enabled more local administrator configuration and update functionality, which doesn't require sub-contracts.
For how long have I used the solution?
Our program has been using CyberArk since 2014, although it was not fully implementated until I took it over in 2017.
What do I think about the stability of the solution?
The product is very stable, limited only by the Windows Operating System is it built upon.
What do I think about the scalability of the solution?
This product seems to be scalable to any size. Providing vault cluster services, distributed vaults, and DR vault implementations, the product is truly ready for global implementation.
How are customer service and support?
Tier One customer service is not as responsive or as knowledgeable as I would like, however, once your service request is sent to a Tier Two support engineer, the knowledge and experience level increases dramatically.
In addition, within the CyberArk support environment, Technical forums are available in which other customers are very willing to share their experience, and offer possible solutions to non-critical issues.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
This was an initial implementation to meet the regulatory requirements of a federal customer.
How was the initial setup?
In our specific case, the initial setup and configuration were very complex, which was a result of the initial design being developed by our internal engineers and CyberArk professional services, neither of which had the "tribal knowledge" of how the network functioned, or how the processes of network engineering and security had been implemented.
What about the implementation team?
The initial implementation was a joint project with CyberArk Professional Services and our internal Systems Engineers. The Professional Services engineers were very knowledgeable regarding the implementation of their products.
What was our ROI?
Our program realized the total ROI after the implementation of policy-based automated password change management, which resulted in a significant reduction in man-hours required to conduct password change management (PCM) on a multitude of network elements.
What's my experience with pricing, setup cost, and licensing?
For licensing on a localized on-prem installation, the CorePAS licensing model enables the most critical component products within the PAM stack, enabling multiple layers of security which can take a while to implement.
Which other solutions did I evaluate?
At the time of the initial implementation (2013-2014), after looking at the field of available products, CyberArk PAM was significantly more mature than the other available products. For that reason, CyberArk PAM was selected.
What other advice do I have?
The greatest issue that I experienced with the implementation of the CyberArk PAM solution was inter-departmental politics regarding change. To resolve this, I relied on the CyberArk Customer Success team to assist with developing a strategy to get all of the stakeholders to accept the changes. Every CyberArk administrator needs to spend time learning about their customer success team since their purpose is to assist with making sure you have the knowledge you need to make sure your implementation is successful.
Which deployment model are you using for this solution?
On-premises
A highly scalable PAM solution that needs to improve its GUI
What is our primary use case?
My company uses CyberArk Enterprise Password Vault for privileged access management, a domain that the product fits under. CyberArk Enterprise Password Vault involves password rotations, recording of sessions, keystrokes, and securing sessions, which all come under the same category in the solution.
What is most valuable?
The most valuable feature of the solution stems from the fact that it's the best in the market. I haven't seen any other PAM solutions better than CyberArk Enterprise Password Vault.
What needs improvement?
CyberArk Enterprise Password Vault's GUI has certain shortcomings that need improvement.
For how long have I used the solution?
I have been using CyberArk Enterprise Password Vault for two years. I use the solution's latest version.
What do I think about the stability of the solution?
It is a stable solution, but sometimes its GUI lags if the load gets too much. If you try to click some buttons, responding will take five seconds instead of just responding immediately.
What do I think about the scalability of the solution?
It is a highly scalable solution.
My company has around 500 uses of the solution and 3,000 to 4,000 accounts, which can be scaled up to 10,000 or 15,000 accounts.
My company does not have plans to increase the usage of the solution.
How are customer service and support?
I am not an admirer of the product's technical support team. The product's technical support team doesn't know the product well enough to give customers suggestions, so they need to work on that part.
Which solution did I use previously and why did I switch?
BeyondTrust and LastPass were the two solutions I had used in the past.
How was the initial setup?
The initial setup of CyberArk Enterprise Password Vault is quite complicated, but if you follow the documentation, I don't think you should have any issues. The issues are only with the solution's support team and the GUI.
The initial deployment just takes about five days to a week if you have got all the network architecture right.
If you don't get the network architecture right, then the deployment could take two or three weeks.
For the deployment process, you should ensure you have some open IP ranges because CyberArk needs to talk to the cloud at its end, so you need to allow certain IPs to make certain connections, after which you need infrastructure and servers in place.
There is a Zip file for your environment, like an image you download from their website, which CyberArk's partners can access. Once you download the Zip file, there are a few scripts to run, and if the scripts run properly, your environment will be set up properly, after which you deploy the connector.
There is a need for an architect who is an expert in CyberArk and networking for the deployment and maintenance, along with one senior engineer.
What was our ROI?
The ROI for the solution is good because if you deploy the product, then you will not face any issues for five to ten years, especially if you manage it well.
What's my experience with pricing, setup cost, and licensing?
Payments have to be made on a yearly basis toward the licensing costs of the solution.
I would say that the solution is expensive because it's only preferred by the top-tier companies involved in banking or insurance who have no problem with budgets for their cybersecurity. A medium or small-sized company would prefer to use some other solution over CyberArk Enterprise Password Vault.
Which other solutions did I evaluate?
was not part of the evaluation process in my company. I wouldn't know why my company chose CyberArk Enterprise Password Vault over other products. I can say that I am comfortable with CyberArk Enterprise Password Vault.
What other advice do I have?
I recommend the solution to those planning to use it. I suggest that CyberArk's potential users invest in getting their own IT environments working perfectly before involving a team of CyberArk-certified engineers since it makes the process a lot easier. If you don't follow the aforementioned steps, then you will find yourself going back and forth to the product's support team, which will take you ages because they take time to respond.
I rate the overall solution a seven out of ten.
It is sometimes hard but overally good solutions to work with.
What do you like best about the product?
CyberArk PAM is actually great for scaling. If you are a little experienced user even impementing additional components may seem a little hard but when you follow all steps you could be sure everyting will work well.
What do you dislike about the product?
Actually PTA component is something what really irritates me sometimes. First reason it is an Unix component and I am not an Unix specialist. Therefore it sometimes behave in not understandable ways.
What problems is the product solving and how is that benefiting you?
It surely solves the problem of: remembering many many passwords for systems such as Windows or Unix servers or network devices. It eliminates need to writing passwords down on sticky notes and having the same password for number of targets.
Good password management with good integrations and security capabilities
What is our primary use case?
The primary use case and the most used functionality of CyberArk PAM is managing privileged access (an easy way to pass permissions to specific servers to specific users granularly) and password management (an automated solution that manages password validity, expiration, etc.). PSM gives a possibility to set all connections secure and it is possible to re-trace actions made by users during such sessions. It is a good tool for extending usage to new end targets sometimes even out of the box.
How has it helped my organization?
CyberArk PAM ended a scenario where several dozens or even hundreds of privileged accounts had the same password or administrators had passwords written down on sticky notes.
I have experience with onboarding thousands of accounts - mostly Windows, Unix, and network devices. I have developed (customized based on defaults) password management plugins for Unix systems and network devices.
What is most valuable?
I like the integrations for external applications. There are actually infinite possibilities of systems to integrate with - you would just need to have more time to do that. It is not an easy job, yet really valuable. I am not an expert on that, however, I try every day to be better and better. I have the support of other experienced engineers I work with so there is always someone to ask if I face any problems. End-customers sometimes have really customized needs and ideas for PSM-related usage.
What needs improvement?
The Vault's disaster recovery features need improvement. There is no possibility to automatically manage Vault's roles and for some customers, it is not an easy topic to understand.
I noticed that CyberArk changed a little in terms of the documentation about disaster recovery failover and failback scenarios. Still, it is a big field for CyberArk developers. Logically it is an easy scenario to understand - yet not for everyone, surely.
For how long have I used the solution?
I've used the solution for around five years. I have been using CyberArk PAM as an end customer for three years. For another two, I work as a CyberArk support specialist.
What do I think about the stability of the solution?
Stability is overall good. However, there are many error messages that are like false-positive - they do not produce any issue yet logs are full of information.
What do I think about the scalability of the solution?
The scaling has been mostly positive. It seems not hard to scale it up.
How are customer service and support?
Sometimes it is hard to understand the capabilities, limitations, etc. They try to help with that.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I've never used another solution that would have the same or similar capabilities.
How was the initial setup?
The initial setup can be complex. It is important to go really carefully step-by-step with instructions. When you do that, you can be 100% sure everything will work well.
What about the implementation team?
When I was an end-customer I recall using a vendor for the implementation and support. Now, I am a vender and therefore I do it by myself.
What's my experience with pricing, setup cost, and licensing?
Licensing may sometimes seem a little complicated. A good partner from CyberArk can work it out.
Which other solutions did I evaluate?
Unfortunately, I have not participated in evaluating other options.
What other advice do I have?
Overall, I am really glad I worked with CyberArk for five years.
Which deployment model are you using for this solution?
Hybrid Cloud
Review for Cyberark.
What do you like best about the product?
wide possibilities and very good support, ease of updating
What do you dislike about the product?
nesting some options that are sometimes hard to find
What problems is the product solving and how is that benefiting you?
- identity management
-automation of changing and replacing passwords in services and tasks
- recording user sessions
Good security, seamless integration, and real time monitoring capabilities
What is our primary use case?
In a large financial institution, CyberArk Privileged Access Management (PAM) plays a pivotal role in ensuring the security and integrity of sensitive financial data. With numerous systems, applications, and databases holding critical client information and transaction data, the institution faced the challenge of managing and protecting privileged accounts effectively.
The PAM solution was seamlessly integrated into the existing IT infrastructure. It introduced granular access controls, requiring all employees to log in with standard user accounts, regardless of their role. When a privileged action is required, the PAM system enables the temporary elevation of privileges through just-in-time (JIT) access, granting access only for the necessary time frame. This reduces the window of opportunity for potential cyber threats.
How has it helped my organization?
CyberArk Privileged Access Management (PAM) has been a game-changer for our organization's security landscape. With PAM in place, we've experienced a significant reduction in potential security breaches. The meticulous control it offers over access rights ensures that only authorized personnel can access critical systems and sensitive information. The implementation of just-in-time access has effectively minimized our attack surface, making it incredibly challenging for unauthorized users to exploit vulnerabilities.
What is most valuable?
The most valuable features of CyberArk Privileged Access Management (PAM) are its granular access controls and just-in-time (JIT) access provisioning. These features ensure that only authorized users have elevated privileges and access to critical systems. JIT access reduces the attack surface by granting privileges only when needed, minimizing exposure to potential threats.
Additionally, robust auditing and real-time monitoring capabilities enhance security by tracking privileged activities, aiding in threat detection and compliance. PAM's ability to seamlessly integrate into existing infrastructures and streamline workflows further adds operational efficiency, making it an indispensable tool for modern cybersecurity.
What needs improvement?
CyberArk PAM could greatly benefit from an under-the-hood update; integrating machine learning algorithms could provide predictive insights.
The user interface lacks intuitiveness; revamping the UX of the web access panel through intuitive navigation, customization, contextual assistance, visual coherence, and accessibility considerations will undoubtedly result in higher user satisfaction, increased engagement, and ultimately, a more competitive offering in the market.
In addition, several tools seem to be outdated, however, you can see that CyberArk is constantly working on them.
For how long have I used the solution?
I've used the solution since 2017.
Which deployment model are you using for this solution?
On-premises