Good password rotation with helpful reporting and auditing functions
What is our primary use case?
We use the solution for privileged access to internal systems and multiple customer environments.
We have distributed PSM and CPM components throughout multiple sites and customer domains access over the VPN, with PSM load balancing handled via third-party hardware load balancers.
Environment segregation and security are high on the criteria for the implemented solution, however, not at the overall expense of performance.
We tend towards providing access to privileged admin applications direct from the PSM servers wherever suitable, yet offload additional workloads to siloed RDS collections if the need arises.
How has it helped my organization?
I appreciate the ease of use for support analysts. We provide a single pane of glass access to our analysts where segregated admin access is provided via safe access groups. The overall goal is to provide the analysts with just enough access to function without being totally impaired by security constraints. With the piece of mind that the auditing and recording capabilities allow. We provide access to fully managed systems via distributed PSMs, or where the need arises we can provide access to online third-party access points via a central pool of web-enabled PSMs.
What is most valuable?
The most important feature is the password rotation and recording to align with customer security requirements.
The reporting and auditing functions allow us to provide evidence-based accounting to customers or security personnel when or if required. Being able to prove that "it does what it says on the tin" is a very key selling point or point scorer in project and planning sessions.
The marketplace default connectors are constantly evolving and simplifying administration. In the case of one not being available then the majority of additional requests can be catered for with some clever AutoIT scripting.
What needs improvement?
Remediation of some of the platform settings in the master policies section would be handy.
Overall what I would really love to see is the third-party PAS reporter tool pulled more into the overall solution, ideally as its own deployable component service installation package, that could be installed/branded alongside the PVWA service, and build out API integration so that third party calls could draw valuable data directly out of the management backend with very little amount of additional admin overhead.
For how long have I used the solution?
I've used the solution for eight years.
What do I think about the stability of the solution?
The solution is very stable; if instability is ever experienced it is likely to be as a result or symptom of a problem elsewhere, such as external factors (updates, network etc.).
What do I think about the scalability of the solution?
The solution is fairly scalable, although depending on how far and wide you stretch your footprint, you may be better suited to multiple smaller vaults and component environments, than one large pot.
How are customer service and support?
Initial call logging can be tedious at times. If you clearly articulate an issue yet are then required to collate entirely irrelevant logging information or jump through a default set of "have you tried this" questions it can cause frustration. Call escalation via account management has improved and when needed we have then progressed with support at a faster pace.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I have not worked with a solution with a focus explicitly for PAM.
How was the initial setup?
The initial setup was both straightforward and complex in equal measure.
What about the implementation team?
The majority of the setup was in-house. On occasion, we have engaged the vendor team and always had a positive outcome.
What was our ROI?
I'm not in the loop to be able to answer to ROI.
What's my experience with pricing, setup cost, and licensing?
Engage with Cyberark account management and professional services to fully understand your current, expected, and future requirements.
Some default settings applied early on may be very time-consuming to amend at a later date (for example, set a default attribute in a platform, extrapolate that platform out to 300 other platforms and a single change may then have to be retrofitted 300 times). So the more scope you can define at deployment the better.
Which other solutions did I evaluate?
I believe other vendors were evaluated prior to selecting CyberArk.
What other advice do I have?
I'd advise other users to take their time, measure twice, and cut once.
Good automation, reduces human error, and offers helpful support
What is our primary use case?
Our primary use case is the scheduled password change management of Windows, Linux, and Cisco privileged local user passwords, as well as providing internal applications using the REST API credentials to access and maintain network elements.
Utilizing the CyberArk Password Vault DR implementation, we have a ready resource as a hedge against network issues caused by seasonal hurricanes through having a replicated DR vault in an out-of-state facility.
How has it helped my organization?
The implementation of the CyberArk Privileged Access Management has reduced the total labor cost of doing quarterly password change management (PCM) on the thousands of network elements (routers & switches), servers, and workstations throughout our nationwide network.
In addition to reducing the direct labor cost of the PCM procedures, the automation aspect has reduced risk that has previously resulted in many lost man-days resolving issues which previously was attributed to human-factor error during PCM procedures.
What is most valuable?
Utilizing the Central Policy Manager to provide policy programmable password change management automation, which can be configured either globally, or by using the individual PlatformIDs which limits the effect of human error on a nationwide implementation of network devices that are remotely co-located and not readily accessible.
The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials.
What needs improvement?
My personal wishlist of features has been fulfilled with versions 12.6 and 13.2, which provide a host of improvements that the administrator community has been asking for.
With these version releases, that leaves my only "unfulfilled" product improvement request to be the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members.
For how long have I used the solution?
We originally implemented the product in 2014 as a compliance mandate and fully integrated the application and functionality in 2017. We have just finished our fourth product upgrade and expanded our enterprise vault space to meet growing demand.
What do I think about the stability of the solution?
My implementation has been very stable over the past seven years, only having minor hiccups caused by "human error" during the "accidental" editing of a configuration file.
What do I think about the scalability of the solution?
We currently store over 50,000 privileged passwords, and I know if our network doubled tomorrow, the product would scale to meet the increased demand.
How are customer service and support?
There are two specific organizations within CyberArk that can provide customer assistance.
The customer success team is there with serious advanced knowledge to assist when things are not flowing. In my specific case, while I was learning to be a PAM administrator, I routinely contacted our customer success team with questions related to "Where can I find this documentation?", "How does this work?" and my favorite, "How can I put my permission back onto a safe?"
The other team is the professional services team, whose job is to be able to come in, analyze an issue, and correct it with the utmost speed. These are also highly experienced individuals that can be brought in the expand your implementation as needed.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Prior to the implementation of the CyberArk Privileged Access Manager, the security operations utilized unencrypted spreadsheets to store privileged passwords, which became a POAM when discovered during a routine security audit.
How was the initial setup?
Our organization utilized the CyberArk professional support team to come in and provide a local, hands-on planning and implementation approach. This implementation methodology actually reduced long-term costs by making sure the implementation was done according to CyberArk's Best Practices.
What about the implementation team?
Our organization utilized CyberArk's professional support team to come in and provide a local, hands-on planning and implementation approach. This implementation methodology actually reduced long-term costs by making sure the implementation was done according to CyberArk's Best Practices.
What was our ROI?
Our annual support costs are offset by the reduced labor costs within the SOCC environment, as the product has automated most of the password change management procedures, allowing labor to be focused on other topics.
What's my experience with pricing, setup cost, and licensing?
While the IAM space is heating up with new vendors, both CyberArk development and the product team seem to be ahead of the curve, with features and products to enable enterprise customers the ability to secure their networks and break the intrusion cycle.
Which other solutions did I evaluate?
CyberArk was our first venture into a secure password vault and was implemented at the recommendation of our federal customer.
What other advice do I have?
The product takes some time to learn. That said, CyberArk Software offers both a customer success team as well as paid professional support to assist.
The customer success team has always seemed to be in my corner when needed, bringing insight and assistance when I was unable to resolve some of my "self-created issues".
Identity Management Excellence
What do you like best about the product?
Utilizing the Accounts Discovery function within CyberArk, along with its REST API, we have automated the detection, sorting and onboarding of new privilaged accounts freeing up man hours that used to be spent tracking down and manually adding accounts.
What do you dislike about the product?
I believe the single thing that I have disliked about CyberArk was the product documentation. As an administrator, trying to use the past documentation methods, finding specific procedures was difficult. This issue has been much inproved with the web-based documentaiton.
What problems is the product solving and how is that benefiting you?
Initially, the CyberArk PAS suite was implemented to reduce the risk of privileged passwords being stored in multiple spreadsheets around the enterprise. These spreadsheets were impossible to keep track of, as employees were forewver making local copies which created both a security issue, but also a support issue. When the Security Operations team would initiate a password change project for a specific segment, all of the "stored" passwords on the employee-copied spreadsheets would be wrong, resulting in an increase in SOCC calls for assistance with account lockouts.
Market leader
What do you like best about the product?
CyberArk can manage passwords and sessions of a huge number of devices/endpoints. It is highly customizable, but it may require extensive product and scripting/programming knowledge.
What do you dislike about the product?
As configuration options are very extensive, it is sometimes hard to find the correct and complete way of customization or specific configuration. The documentation is rather basic and it is missing may use cases.
What problems is the product solving and how is that benefiting you?
It's a privileged access management tool so it helps in making sure that all privileged accounts are compliant. It's an important measure against credential theft.
More that 12 years of experience with CyberArk EPV
What do you like best about the product?
Its ability to provide secure session issolation as well as automatic password managent for wide range of different types of target devices.
What do you dislike about the product?
User experience based on two different web environments.
What problems is the product solving and how is that benefiting you?
Password management of all privileged accounts withing the organisation.
CyberArk review.
What do you like best about the product?
Password rotation and abilities to track account usage.
What do you dislike about the product?
Upgrades aren't easy. Also, reporting could be better.
What problems is the product solving and how is that benefiting you?
The biggest issue for us was password rotation.
Highly capable product
What do you like best about the product?
When implemented correctly, it can reduce risk of credential compromise, but people should be ready to put the effort into making this work as intended and not having it become a "storage" facility.
What do you dislike about the product?
It's really more about the organization where support has not been as good as I would've hoped. A "large" org should have the capability to go directly to a higher level support tier when issues arise. Also, account personel could be more responsive to customer requests and needs. We tried a TAM in the past, and that didn't work out. A contnual check in with customers on a technical and non-technical basis is needed to help drive customer product ROI and vendor product development.
What problems is the product solving and how is that benefiting you?
With credential compromise a primary attack vector, we are reducing our risk when and where this technology is applied to our privilege accounts. They exist not only in interactive admin accounts, but in service and application accounts as well.
A highly scalable solution with good features, like session recording
What is our primary use case?
My company uses CyberArk Enterprise Password Vault for our servers and when our IT partners try to access our mission critical systems. We have also integrated the product with software tools used for authentication purposes. Our company's IT uses LDAP credentials to log in to the PVWA application while also being able to use granted privileges on one or more servers.
What is most valuable?
The most valuable feature of the solution is session recording.
What needs improvement?
There is a little bit of confusion in the implementation part, especially when one tries to understand the actual working of the product. The ones involved in the implementation of the product did not show the people in our company how they work on the product. The aforementioned area can be considered for improvement.
For how long have I used the solution?
I have been using CyberArk Enterprise Password Vault for a year and six months. The product is used in my company. I use CyberArk Enterprise Password Vault Version 12.0. I am a customer of the product.
What do I think about the scalability of the solution?
It is a scalable solution.
We upgraded the solution even though we had subscribed to the product for ten years in our company. In our company, we wanted around 50 employees to be able to operate the solution.
How are customer service and support?
From my end, I have not used technical support. I don't know if my colleagues have faced any problems because of which they had to contact technical support.
How was the initial setup?
The implementation took place over a period of three months.
The solution is deployed on-premises.
What's my experience with pricing, setup cost, and licensing?
CyberArk Enterprise Password Vault is a very expensive product.
I believe that the charges for maintenance and support are already included in CyberArk Enterprise Password Vault's pricing policy.
What other advice do I have?
I will tell those planning to use the solution that it is a very expensive solution. Due to the cyber security constraints of the product, most of the companies are forced to update by paying money to CyberArk, which I feel is one of the problematic areas in the product. Feature-wise, it is a very good product.
I rate the overall product a nine out of ten.
Cyberark PAM is a great product.
What do you like best about the product?
Cyberark PAM is great tool for managing and rotating passwords. The tool manages ensures our passwords are secure and rotated on a regular and consistent basis which helps us address several audit findings.
What do you dislike about the product?
The Cyberark PAM user interface is a bit clunky and could use some refining.
What problems is the product solving and how is that benefiting you?
PAM is configured and managed to ensure that our passwords are secure and rotated on a regular and consistent basis. This ensures several audit items are addressed.
Good suite with a steep deployment and learning curve
What do you like best about the product?
Can be a very powerful and comprehensive PAM suite.
What do you dislike about the product?
On prem deployment and user/administrator learning curves can be steep which inhibit uptake
What problems is the product solving and how is that benefiting you?
Privileged account lifecycle and secure secret storage