CyberArk
CyberArk
Updated August 20, 2025
Updated August 20, 2025
CyberArk manages privileged access by securing, monitoring, and controlling credentials across IT environments. It integrates with various platforms to enforce least privilege policies and reduce risks associated with credential misuse.
CyberArk manages privileged access by securing, monitoring, and controlling credentials across IT environments. It integrates with various platforms to enforce least privilege policies and reduce risks associated with credential misuse.
Privileged Access Management
Cost considerations
Cost considerations
Functionality
Functionality
Compatibility
Compatibility
User experience
User experience
Customer support
Customer support
Why these ratings?
Cyberse perspective
Cyberse perspective
Solution details
Target industry
Technology
Public sector
Industrials
Healthcare
Retail
Manufacturing
Financial services
Services support
In-house services
Third party integrators
Managed services
Product features
Password Management
Privileged Access Management (PAM)
Role-Based Access Control (RBAC)
Multi-Factor Authentication (MFA)
Pricing
Free trial available
Market segment
Enterprise
Key features
API access
Platform solution
Integrations
Security automation
Endpoint security
Cloud security
Governance Risk and Compliance
Network security
Data security
Deployment
On-premises
Cloud-hosted
Cloud ecosystem partners
Amazon Web Services
Microsoft Azure Cloud
Google Cloud Platform
Ratings
Cost considerations
CyberArk requires separate licenses for PAM, endpoint privilege, secrets, and add-on analytics, so costs scale upward as scope widens. Public price details are limited, making budgeting less predictable than the published per-user tiers many rivals offer. Buyers often see a higher total cost of ownership and longer payback period compared with mid-market identity suites.
Cost considerations
CyberArk requires separate licenses for PAM, endpoint privilege, secrets, and add-on analytics, so costs scale upward as scope widens. Public price details are limited, making budgeting less predictable than the published per-user tiers many rivals offer. Buyers often see a higher total cost of ownership and longer payback period compared with mid-market identity suites.
Privileged account count
Functionality
CyberArk combines PAM with cloud SSO and adaptive MFA and automates user creation and removal via HR and directory feeds. Just-in-time privileged sessions and risk-based policies satisfy most lifecycle and governance needs, though analytics depth lags specialist IGA suites. Functionality outpaces typical SSO vendors but falls a step short of the few providers that deliver comprehensive identity governance.
Functionality
CyberArk combines PAM with cloud SSO and adaptive MFA and automates user creation and removal via HR and directory feeds. Just-in-time privileged sessions and risk-based policies satisfy most lifecycle and governance needs, though analytics depth lags specialist IGA suites. Functionality outpaces typical SSO vendors but falls a step short of the few providers that deliver comprehensive identity governance.
Compatibility
CyberArk connects natively to AD, LDAP, Azure AD and leading HR sources and offers open REST APIs. Standards such as SAML, OIDC and SCIM cover both cloud and on-prem apps with minimal configuration. These broad connectors reduce custom integration effort relative to most competitors.
Compatibility
CyberArk connects natively to AD, LDAP, Azure AD and leading HR sources and offers open REST APIs. Standards such as SAML, OIDC and SCIM cover both cloud and on-prem apps with minimal configuration. These broad connectors reduce custom integration effort relative to most competitors.
User experience
Employees get a usable web portal, yet administrators must navigate a dense console that requires training. Password and MFA enrollment function reliably but feel dated versus newer cloud rivals, slowing onboarding. Extensive manuals help, but overall complexity keeps the experience at an average level.
User experience
Employees get a usable web portal, yet administrators must navigate a dense console that requires training. Password and MFA enrollment function reliably but feel dated versus newer cloud rivals, slowing onboarding. Extensive manuals help, but overall complexity keeps the experience at an average level.
Customer support
CyberArk offers round-the-clock help for severity-1 cases and typically answers within the four-hour window buyers expect. Escalations go to specialists who understand PAM and identity standards, and customers can tap a well-populated knowledge base and community forum. A few reviews mention longer waits for non-critical fixes, so support is strong but not the very top tier.
Customer support
CyberArk offers round-the-clock help for severity-1 cases and typically answers within the four-hour window buyers expect. Escalations go to specialists who understand PAM and identity standards, and customers can tap a well-populated knowledge base and community forum. A few reviews mention longer waits for non-critical fixes, so support is strong but not the very top tier.
Explore similar solutions
Explore similar solutions
Explore other categories
Explore other categories
Cyberse provides free tools for cybersecurity buyers to assess needs, research solutions, and compare products.
Cyberse provides free tools for cybersecurity buyers to assess needs, research solutions, and compare products.
Subscribe


