My role involved installing agents on Linux servers, specifically utilizing a single sign-on. This implementation streamlined access for Linux and Unix administrators, allowing them to log in to any server using a single password.
CyberArk Workforce Identity
CyberArkExternal reviews
External reviews are not included in the AWS star rating for the product.
Great for executing user reviews for your financial systems
Zilla helps audit access to multiple systems
PPFA - Zilla reivew
Allows Linux and Unix administrators to login with single password
What is our primary use case?
What is most valuable?
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring.
It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days.
The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.
What needs improvement?
The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support.
What do I think about the stability of the solution?
I rate the tool's stability a seven out of ten.
What do I think about the scalability of the solution?
I rate CyberArk Identity's scalability a nine out of ten.
How was the initial setup?
CyberArk Identity's deployment is easy. For deployment, the timeline depends on the number of applications a company has. For instance, if there are around 100 applications, the deployment process is expected to take no more than two weeks. For larger organizations, it can take one month to complete. The entire IT process for creating rules and user entitlements for each application can take at least a month. For large organizations with 500 or more applications, at least 20 people are needed to manage the product daily.
What's my experience with pricing, setup cost, and licensing?
The solution is cheap and I rate its pricing an eight out of ten.
What other advice do I have?
I rate thee overall product an eight out of ten.
I have one year experience on CyberArk tools to manage my organisation identity & access management
"Best Tool For PAM - CyberArk Identity"
They've implemented a robust security approach that is superior to many other solutions in terms of protecting privileged users and their keys
What is our primary use case?
CyberArk offers multiple products, including PAN, LRO for vendor remote access, and Identity. Some clients in the entertainment and tourism industry prefer using CyberArk Identity on the cloud as a Software as a Service (SaaS) solution. Their teams are typically small and prefer not to manage the infrastructure. They opt for this approach because they want to avoid investing significant time and money in larger products like SailPoint. However, it's important to note that such clients are relatively rare, with perhaps just one or two out of every hundred.
What is most valuable?
Regarding identity management, it's worth noting that onboarding users from various sources is a straightforward process with CyberArk SaaS. The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS.
On the PAM side, one of their notable strengths lies in safeguarding the keys and users for privileged accounts. They've implemented a robust security approach that is superior to many other solutions in terms of protecting privileged users and their keys.
What needs improvement?
In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one. They struggle with identifying risk scores efficiently because their risk scoring relies on the manual entry of access data. In contrast, SailPoint excels in this aspect and can detect and provide superior governance scores more effectively.
To be equitable, one notable aspect is that CyberArk is gradually moving away from on-premises components and migrating them to the cloud. However, from my perspective, they should consider retaining some on-premises components instead of entirely removing them. I understand that this decision might be related to cost and future prospects. Nonetheless, considering the global trend of securing and controlling data, offering everything solely in the cloud could become problematic for many organizations.
For how long have I used the solution?
I have been working with it for more than two and a half years.
What do I think about the stability of the solution?
In terms of stability, I would rate it an eight. It's important to consider that a comprehensive solution requires a minimum of nine servers, which can pose challenges in terms of management and overall stability due to the substantial number of components involved.
What do I think about the scalability of the solution?
When it comes to scalability, there are two distinct aspects to consider with CyberArk. License scalability is notably straightforward and perhaps the easiest compared to other solutions. However, architectural scalability can be quite complex and challenging.
I would rate it a nine out of ten.
How are customer service and support?
To be completely frank, among my ten clients, a minimum of six express concerns or confusion regarding CyberArk. I'm not certain whether it's linked to the clients' skill levels or understanding, but I suspect that the support ecosystem is not adequately developed.
How was the initial setup?
It's a straightforward process if you have skilled resources on hand. However, if your resources lack the necessary expertise, they might face challenges.
What's my experience with pricing, setup cost, and licensing?
If we're looking at a comparison once more, it's important to acknowledge the crowded nature of the market. With so many players, including Arcon, BeyondTrust, WarLX, and others, the field is diverse. However, when focusing on the top products, I'd highlight BeyondTrust, CyberArk, Delinea, and Arcon. In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard.
Which other solutions did I evaluate?
In the realm of identity management, SailPoint is the leader due to its extensive features and customization capabilities, making a direct comparison with CyberArk somewhat unfair as SailPoint tends to excel. However, among CyberArk's competitors, Ping Identity stands as a strong contender. Ping Identity has been involved in the identity space for a longer period than CyberArk. Furthermore, there have been mergers in this space, such as FosRoc and BeyondTrust. This has reshaped the landscape, and the competition should now primarily be between Arcon, Ping Identity, and SailPoint, as other products tend to be smaller, like Micro Focus. Comparing them with Micro Focus wouldn't be suitable.
What other advice do I have?
Enterprises generally have the resources to handle the compute and storage requirements and can allocate additional resources for CyberArk management without significant issues. However, medium-sized companies need to exercise caution as they might need to hire dedicated resources for solution management, which can increase maintenance costs. Small organizations, on the other hand, are likely to face numerous challenges during upgrades, migrations, and maintenance due to their limited resources. CyberArk is best suited for larger enterprises.
Overall I would rate it an eight out of ten.
Outstanding tool for PAM
Along with that CyberArk Identity works very well to prevent the Ransomware attacks.
A stable tool for password management and session management used by some of the top-tier companies worldwide
What is our primary use case?
My company uses CyberArk Identity for password vault, password management, and session management.
How has it helped my organization?
CyberArk Identity is the best PAM solution in town. Even though there are a lot of competitors of CyberArk Identity in the market, most of them do not have the market domination like CyberArk Identity.
What needs improvement?
CyberArk Identity's GUI is an area with certain shortcomings that need improvement.
For how long have I used the solution?
I have been using CyberArk Identity for two years. I use the solution's latest version.
What do I think about the stability of the solution?
It is a very stable solution. Stability-wise, I rate the solution an eight out of ten.
What do I think about the scalability of the solution?
It is a scalable solution. Scalability-wise, I rate the solution a nine out of ten. If you scale it up too much, then the solution lags performance-wise, causing it to slow down.
My company deals with its clients, and based on my current workplace, I have seen 300 users of the solution.
There are no plans to increase the number of users.
How are customer service and support?
CyberArk Identity's technical support needs to know its own product well enough before telling others how it works. The support team should be more knowledgeable.
How was the initial setup?
The initial setup of CyberArk Identity was straightforward.
The solution is deployed on the cloud.
The solution could be deployed in a week.
For the deployment process, we need to get your networking right and make sure you download the correct version of the solution, after which you can deploy the solution after ensuring that you have all the required infrastructure.
A manager and a senior engineer are required for the deployment and maintenance.
What about the implementation team?
You can do the installation with the help of an integrator or consultant. The installation can be done in-house with the help of the product's documentation.
What was our ROI?
CyberArk Identity is a good investment. Once you deploy, I would say that you can use it for a long time.
What's my experience with pricing, setup cost, and licensing?
Speaking about the price, I can only say that the solution is used by all the top-tier companies worldwide. There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity.
What other advice do I have?
I recommend the solution to those planning to use it.
I recommend the solution to those planning to use it. The solution's potential users should ensure that you scale it properly and don't scale it beyond what is required because its performance lags.
I rate the overall solution an eight out of ten.
Zilla is a great tool
1. A view into what users are in what tools/systems without having to have everyone be an admin in those systems directly
2. A view into what permissions each user has and a way to audit those
3. A great view for offboarding employees when they leave -- it helps IT track down accounts they may not otherwise know about.
4. Zilla Universal Sync is easy to use and intuitive for discovering and auditing users in apps that aren't supported natively in Zilla.
It has improved our overall security posture. Many of our users and admins are very excited about its capabilities.
1. Zilla can't track what it doesn't know about. In our (small) organization, departments often have their own separate accounts/relationships that aren't centralized. Finding and putting all of these in Zilla takes significant time, due to our own unorganized nature
2. If you aren't regularly running audits, Zilla won't fix your security problems for you. This, again, is more of an organization issue than a Zilla issue. It does mean more work on our end, but it's work we should already be doing and Zilla makes it much easier!
1. Who has what accounts and where
2. What permissions do they have, and can we reduce/change those
It benefits us greatly when we remove outdated accounts that are no longer needed, and removing unneeded permissions greatly helps us reduce our risk profile.