Prices can vary greatly based on features needed, support and customization requests. Knowing what you're after helps vendors give you the most fair price.
Network Security
Endpoint Detection and Response (EDR)
Threat Hunting
Incident Response & Remediation
User Provisioning/Deprovisioning
Single Sign-On (SSO)
Multi-Factor Authentication (MFA)
Passwordless Authentication
Contextual Authentication
Clientless Access
Secrets Management
System for Cross-domain Identity Management (SCIM)
Password Vault
Password Strength Check
Password Rotation
Device Discovery
Device Control
Device Isolation
Network Discovery
Network Control
Network Isolation
Activity Logs
Audit Trail
Compliance Reports
Risk Assessments
Behavioral Analytics
Policy Assessments
Anti-Malware
Anti-Ransomware
Anti-Phishing
Anti-Spam
Active Directory
Update/Patch Management
Policy Management
Centralized Console
Storage
SOC 1
DevOps
Have you used CyberArk in the past?
Help other people find the right software by sharing your CyberArk experience.