Top Rated CyberArk Privileged Access Manager Alternatives
Very advanced security. Wide selection of marketplace integrations. Review collected by and hosted on G2.com.
It is complex to install and upgrade. Vendor engagement is a must for install. Review collected by and hosted on G2.com.
63 out of 64 Total Reviews for CyberArk Privileged Access Manager
Overall Review Sentiment for CyberArk Privileged Access Manager
Log in to view review sentiment.
It can take care of automatic password rotation and comes with good security features such as one time password, password change on check out and one can do remote connection to many protocols such as http, RDP, ssh, databse etc Review collected by and hosted on G2.com.
Product is too fragile, upgrades always breaks the product and never goes smoothly. Customer support needs to improve a lot. Integration was also troublesome. Review collected by and hosted on G2.com.
I like the way we can securely connect to the servers and perform the activity without worrying about the cyberattacks or security threats and the implementation is also very easy Review collected by and hosted on G2.com.
Sometimes I felt could not connect to any servers after logging into MFA with SSO. It says username or password is incorrect Review collected by and hosted on G2.com.

CyberArk is a SAAS based application which is used to manage all privilege application, Vaulting of secrets and other services Review collected by and hosted on G2.com.
The password rotation is bit need improvement compared to other privilege access management tools such as Delinea/Thycotic secret servers Review collected by and hosted on G2.com.
Utilizing the Accounts Discovery function within CyberArk, along with its REST API, we have automated the detection, sorting and onboarding of new privilaged accounts freeing up man hours that used to be spent tracking down and manually adding accounts. Review collected by and hosted on G2.com.
I believe the single thing that I have disliked about CyberArk was the product documentation. As an administrator, trying to use the past documentation methods, finding specific procedures was difficult. This issue has been much inproved with the web-based documentaiton. Review collected by and hosted on G2.com.

CyberArk capabilities to manage authentication is really strong. It can help every enterprises to setup complex rules to manage the session & also monitor it. Review collected by and hosted on G2.com.
CyberArk redundancy is hard to manage. Sometimes you need to manually bring it up after a failure. Review collected by and hosted on G2.com.

CyberArk is one the best Privilege Access Management tools which used for enable or disable access of admin credentials as per our requirement. We can easily integrate with third party application access management. Review collected by and hosted on G2.com.
CyberArk tools logout again and again and sometimes password not updated account organizational policy which setup for reset password. Review collected by and hosted on G2.com.
CyberArk PAM is actually great for scaling. If you are a little experienced user even impementing additional components may seem a little hard but when you follow all steps you could be sure everyting will work well. Review collected by and hosted on G2.com.
Actually PTA component is something what really irritates me sometimes. First reason it is an Unix component and I am not an Unix specialist. Therefore it sometimes behave in not understandable ways. Review collected by and hosted on G2.com.
Session monitoring and isolating, Password management (automated rotation, reconciliation). Remedation capabilities are one of the strongest points in CyberArk PAM Review collected by and hosted on G2.com.
Administration could be quite difficult and requires a lot of experience. Review collected by and hosted on G2.com.
When implemented correctly, it can reduce risk of credential compromise, but people should be ready to put the effort into making this work as intended and not having it become a "storage" facility. Review collected by and hosted on G2.com.
It's really more about the organization where support has not been as good as I would've hoped. A "large" org should have the capability to go directly to a higher level support tier when issues arise. Also, account personel could be more responsive to customer requests and needs. We tried a TAM in the past, and that didn't work out. A contnual check in with customers on a technical and non-technical basis is needed to help drive customer product ROI and vendor product development. Review collected by and hosted on G2.com.
There is no limit to the integrations as you can implement all sort of bespoke plugins and integrations.
Can be deployed in hybrid self-hosted on-prem and private cloud environments.
Supports the cross-border restrictions by allowing the deployment of as many satellites as required. Review collected by and hosted on G2.com.
It's based on a vaulting passwords approach, which is a perfect use case for last resort accounts.
However for business as usual tasks it's better to implement fine grained just in time solutions.
To cover all the security use cases, it has to be combined with additional solutions like CyberArk Identity or CyberArk Conjur. Review collected by and hosted on G2.com.