CyberArk
CyberArk
9 reviews
WH Score
8.2

CyberArk Overview

What is CyberArk?

CyberArk is an industry leader in Identity & Access Management (IAM). CyberArk is trusted by global organizations for identity protection and as a defense system against cyber attacks. The CyberArk Endpoint Privilege Manager has 100% efficacy against more than 3 million ransomware strains. Having more than 7000 customers, CyberArk operates in 110 countries around the globe. More than 50% of the Fortune 500 companies and more than 35% of the Global 2000 trust CyberArk for identity & access management.

What is CyberArk Used For?

CyberArk is a complete identity security platform that is used to secure the identities of both humans and machines from end to end. The industries that CyberArk is helping include banking, insurance, healthcare, energy, telecom, manufacturing, and federation. The solutions provided by CyberArk include insider threat protection, IoT and operational security, ransomware protection, industry and regulatory compliance, DevOps pipelines and cloud-native apps security, remote workforce access, and secure cloud workloads. 

What Are The Top CyberArk Features?

CyberArk’s product Privileged Access Manager or PAM promises to mitigate risk while maximizing productivity. Following are some features that it offers to fulfill this promise:

  • Adaptive MFA and SSO: It validates the privileged users with Adaptive Multi-Factor authentication and gives secure access to business resources with Single Sign-On.
  • Remote Access: Remote employees and external vendors can access PAM remotely without VPN, agent, or password.
  • Nomadic Device Management: Even when the endpoints are not connected to the enterprise network, you can enforce security policy and use account credentials.
  • Threat Detection: The system automatically discovers unmanaged privileged accounts, detects anomalous behavior, and responds accordingly.
  • Managed Privileged Credentials: Automated password rotation saves a lot of time for IT teams and strengthens security.

What are the Main CyberArk Benefits?

With CyberArk your system gets secured against cyberattacks as the software protects both human and machine privileged identities in a tamper-resistant repository. Moreover, CyberArk also satisfies your audit and compliance needs by maintaining a fully centralized audit. A major benefit for the digital business is that you can securely authenticate users with VPN-less access using a single web portal.

CyberArk products designed for identity protection and access management are scalable, which means they are great for a business of any size. The out-of-the-box integrations enabled by CyberArk further enhance all that you can achieve by using it. Some of the important integrations include Microsoft Azure AD SAML, Amazon Workspaces, and JIT. 

How Much Does CyberArk Cost?

When it comes to selling its software, CyberArk uses a customer-first approach. To make sure that the customers get an idea of the product before they make a purchase, CyberArk offers free trials as well as demos. To start your identity security journey the right way, you can also talk to one of CyberArk’s experts who will give you a first-hand look at the CyberArk solutions. To check out the multiple integrations offered by CyberArk you can also check out the CyberArk Marketplace.


CyberArk Recent Reviews


Z
Zachary
Reviewed on 20 September 2023

Empowering Secure Privilege Management

For the PAS application, its scalability and redundancy options are outstanding. Adding another server behind the load balancer is a breeze. Regarding the EPM application, its high adjustability and flexibility make it suitable for a wide range of uses.

Pros
  • It has seamlessly transitioned into our production and infrastructure workflows after strong adoption by our R&D team.
Cons
  • PAS Application: The CPM component lacks easy scalability
  • Performance issues arise with large deployments
  • Requests may fail or not execute with a large pool of data

R
Rosanna
Reviewed on 3 May 2023

CyberArk PAM: Simplifying Access Management Workflows."

CyberArk effectively addresses the need for defining dynamic rules in user onboarding flows. It allows for automatic approval of certain business-driven rules, while others can be manually approved. This functionality streamlines the access management process and ensures efficient and secure onboarding of users.

Pros
  • The ability to seamlessly support workflow for access requests is one of the key strengths of CyberArk
  • It provides a smooth and efficient process for managing access requests, ensuring streamlined operations.
Cons
  • One of the challenges I encountered initially was the learning curve associated with understanding the platform parameters used for scripts and rule definitions
  • It took some time to become familiar with these parameters and their usage.

CyberArk Pricing


CyberArk Privileged Access Manager
Contact Us
CyberArk Pricing Details

CyberArk Key Features


Cybersecurity Features

  • Network Security
  • Endpoint Detection and Response (EDR)
  • Threat Hunting
  • Incident Response & Remediation

Identity and Access Management (IAM)

  • User Provisioning/Deprovisioning
  • Single Sign-On (SSO)
  • Multi-Factor Authentication (MFA)
  • Passwordless Authentication
  • Contextual Authentication
  • Clientless Access
  • Secrets Management
  • System for Cross-domain Identity Management (SCIM)

Password Management

  • Password Vault
  • Password Strength Check
  • Password Rotation
CyberArk Features Details

CyberArk Media


CyberArk Videos

CyberArk Wheelhouse Score

8.2
What is this?

The Average Wheelhouse score for the Identity and Access Management (IAM) category is 8.3

CyberArk User Scores

  • Ease of Use
    8.2
  • Meets Requirements
    8
  • Ease of Admin
    7.4

Need help finding the right software?

Tell us what you're looking for and we'll offer you personalized software recommendations.

Best CyberArk Alternatives

The right software for your business

Get your personalized recommendations now.