CyberArk Privileged Access Manager
What is CyberArk Privileged Access Manager?
The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets. Modernize your PAM program and provide defense-in-depth protection throughout your IT estate, in hybrid and multi-cloud environments. Explore new processes, policies, and controls to better reduce the risks of privileged access.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCyberArk Privileged Access Manager Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on CyberArk Privileged Access Manager.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
91 Likeliness to Recommend
2
Since last award
81 Plan to Renew
14
Since last award
83 Satisfaction of Cost Relative to Value
5
Since last award
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+79 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love CyberArk Privileged Access Manager?
Pros
- Security Protects
- Inspires Innovation
- Acts with Integrity
- Friendly Negotiation
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Compliance Reporting
Agentless Deployment
APP to APP Password Management
Just in Time Access (JIT)
Reporting and Dashboards
Privileged Account Life Cycle Management
Account Vaulting
Local Account & Shared Account Administration
Privileged Remote Access
Privileged User Behavior Analytics
CI/CD Automation (DevOps)
Vendor Capability Ratings
Business Value Created
Ease of Data Integration
Breadth of Features
Vendor Support
Quality of Features
Product Strategy and Rate of Improvement
Ease of Implementation
Availability and Quality of Training
Usability and Intuitiveness
Ease of IT Administration
Ease of Customization
CyberArk Privileged Access Manager Reviews
Saurabh K.
- Role: Information Technology
- Industry: Technology
- Involvement: End User of Application
Submitted Mar 2026
A Robust Solution for Privileged Access Security
Likeliness to Recommend
What differentiates CyberArk Privileged Access Manager from other similar products?
CyberArk Privileged Access Manager stands out from other similar security solutions because it offers advanced access management and monitoring features designed to securely control access to sensitive accounts and critical systems.
What is your favorite aspect of this product?
I have used it to control access to admin accounts and to monitor critical system activities, ensuring that our security posture remains consistently strong.
What do you dislike most about this product?
Initially, I had to invest a little time to correctly configure the various security policies and access control settings.
What recommendations would you give to someone considering this product?
I would suggest that new users thoroughly understand the access policies and monitoring features first, in order to manage system security effectively.
Pros
- Continually Improving Product
- Enables Productivity
- Unique Features
- Efficient Service
Md Z.
- Role: Information Technology
- Industry: Technology
- Involvement: End User of Application
Submitted Mar 2026
A robust solution for privileged access security
Likeliness to Recommend
What differentiates CyberArk Privileged Access Manager from other similar products?
CyberArk PAM stands out from other security platforms because it focuses specifically on protecting and controlling sensitive and high-powered accounts.
What is your favorite aspect of this product?
I've used it to securely track the activities of administrative accounts and control system access.
What do you dislike most about this product?
During the initial setup, I had to spend a significant amount of time correctly configuring various security policies.
What recommendations would you give to someone considering this product?
I recommend that those considering adopting this platform thoroughly understand its core security settings and access control mechanisms.
Pros
- Helps Innovate
- Reliable
- Trustworthy
- Unique Features
Mahesh S.
- Role: Information Technology
- Industry: Consulting
- Involvement: End User of Application
Submitted Mar 2026
The best product with many features.
Likeliness to Recommend
What differentiates CyberArk Privileged Access Manager from other similar products?
CyberArk Privileged Access Manager is distinguished by its extensive array of privileged access management solutions, encompassing credential vaulting, session isolation, and policy enforcement.
What is your favorite aspect of this product?
My preferred feature of CyberArk Privileged Access Manager is its capacity to deliver extensive protection for privileged accounts and access via functionalities such as session monitoring, risk-based authentication, and easy integration with current IT infrastructure.
What do you dislike most about this product?
One disadvantage of CyberArk Privileged Access Manager would be its initial setup and configuration complexity, which could take a lot of time and skill to properly apply.
What recommendations would you give to someone considering this product?
To fully utilize its potential for successfully protecting privileged accounts and access, make sure there are sufficient resources for implementation and continuing maintenance.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing