SaaSReviewsVERIFIED ONLY
CyberArk logo

CyberArk

4.3 (119 reviews)
SecurityCybersecurityPrivileged Access ManagementIdentity SecurityZero TrustCloud Security
About CyberArk

CyberArk is a leading cybersecurity company specializing in privileged access management (PAM) solutions designed to protect organizations from cyber threats targeting critical assets. Their platform secures, monitors, and manages privileged accounts, credentials, and secrets across on-premises, cloud, and hybrid environments. CyberArk's comprehensive approach helps organizations enforce least privilege policies, detect suspicious activities, and respond to potential breaches in real-time. By focusing on identity security and zero trust principles, CyberArk enables businesses to reduce their attack surface, prevent insider threats, and maintain compliance with regulatory requirements. Their solutions support a wide range of industries, including finance, healthcare, and government, helping enterprises safeguard sensitive data and critical infrastructure. With advanced automation, analytics, and integration capabilities, CyberArk empowers security teams to efficiently manage risks associated with privileged access and protect their digital environments from evolving cyberattacks.

Customer Reviews
119 customer reviews
4.3/5
Sort by:
Filter:

Customer Reviews (10)

United States flagMatthew P.

August 6, 2025
5/5 stars
Great session recording and rotation

The session recording feature is a lifesaver for auditing and troubleshooting, making it easy to see exactly what actions were taken. Also, the automatic password rotation works seamlessly and saves a ton of manual effort on our end.

Australia flagJoshua J.

August 3, 2025
1/5 stars
Disappointing decline over time

Started using this over 6 years ago and honestly, it feels like the platform has only gotten more complicated and buggy. Features that once worked smoothly now lag or just don’t do what they’re supposed to, and customer support has been frustratingly slow. At this point, I’m seriously considering other options since it’s more hassle than it’s worth.

United Kingdom flagGerald H.

July 22, 2025
5/5 stars
Excellent session control and vault

The session management feature really streamlines how we monitor privileged access, making audits so much easier. Also, the centralized password vault is rock solid—no more scrambling for credentials or worrying about security gaps.

United States flagSean P.

July 22, 2025
4/5 stars
Strong control and clear auditing

Switched from BeyondTrust and also tested Thycotic, but CyberArk stood out because its session monitoring and audit trails are much clearer and easier to navigate. The setup took a bit longer, but once running, it gave us tighter control without constant troubleshooting.

United States flagJeffrey G.

July 15, 2025
5/5 stars
Smooth adoption, great for teamwork

Our team of about 12 switched over after the boss insisted and honestly, it made sharing credentials way less messy. Getting everyone on board was surprisingly smooth once we saw it cut down on those constant password resets.

Canada flagOwen C.

July 14, 2025
5/5 stars
Smooth and reliable PAM

Switched from BeyondTrust after struggling with their clunky interface, and CyberArk just feels way smoother and more reliable in managing our privileged accounts. I also checked out Thycotic, but CyberArk's session monitoring and detailed reporting made it a no-brainer for our security team.

United Kingdom flagJack H.

July 8, 2025
4/5 stars
Better vault management overall

Switched from BeyondTrust to CyberArk after struggling with BeyondTrust's UI and found CyberArk's vault management way more intuitive. Compared it to Thycotic as well, but CyberArk's session monitoring and reporting features sealed the deal for us.

United Kingdom flagLawrence M.

July 4, 2025
4/5 stars
Improved Security and Collaboration

Our team of about 10 people started using CyberArk when our manager insisted we needed better control over privileged accounts. Getting everyone on board took a couple of weeks, mainly because some found the interface a bit clunky at first, but once we got past that, it really smoothed out how we share and rotate credentials securely. Collaboration improved since we could all access what we needed without emailing passwords back and forth. Overall, it’s been a solid addition, though I wish the setup process was less complicated.

United Kingdom flagLysander T.

June 29, 2025
5/5 stars
Solid and improving over time

Started using this about 6 years ago, and honestly, it's gotten smoother and more reliable every year. Some updates took a bit to get used to, but overall it just feels like they really listen to user feedback.

United Kingdom flagJeremy T.

June 23, 2025
5/5 stars
Smooth and straightforward setup

Getting CyberArk up and running was surprisingly smooth. The onboarding materials made it easy to understand, and I had most of the core features configured within a couple of days without much hassle.

Showing 10 of 119 reviews
Page 1 of 12
Share Your Experience
Help others by writing a review
Sign in to Review

Share your honest experience with CyberArk

Product Details

Category

Security

Tags

CybersecurityPrivileged Access ManagementIdentity SecurityZero TrustCloud Security
Similar Products
Other products in the Security category
Tenable logo

Tenable

Tenable is a leading cybersecurity platform specializing in exposure management, cloud security, and vulnerability management. It empowers organizations to identify, assess, and remediate cyber risks across their entire digital footprint. By providing comprehensive visibility into assets, vulnerabilities, and threats, Tenable enables security teams to prioritize and address the most critical risks effectively. Its robust tools support continuous monitoring of cloud environments, IT infrastructure, and operational technology, helping businesses maintain compliance and strengthen their security posture. Tenable's solutions integrate advanced analytics and automation to streamline vulnerability detection and response, reducing the attack surface and preventing potential breaches. Trusted by enterprises worldwide, Tenable helps organizations know, expose, and close cyber risks to safeguard their digital assets in an increasingly complex threat landscape.

3.6(118)
Okta logo

Okta

Okta is a comprehensive identity and access management platform designed to secure and streamline user authentication for employees, customers, and AI systems. It offers Workforce and Customer Identity Clouds that enable organizations to manage secure access, authentication, and automation across various applications and devices. By centralizing identity management, Okta helps businesses enhance security, improve user experience, and accelerate digital transformation initiatives. The platform supports single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and API access management, ensuring robust protection against unauthorized access while simplifying IT operations. Okta’s solutions are scalable and adaptable, catering to enterprises of all sizes and industries, and integrating seamlessly with existing IT infrastructure and cloud services. With a focus on putting identity at the core of business security and growth, Okta empowers organizations to confidently manage digital identities in an increasingly complex and connected world.

3.6(170)
Dashlane logo

Dashlane

Dashlane is a comprehensive password management and credential security platform designed to safeguard individuals, businesses, and enterprises. It offers an easy-to-use yet powerful solution to securely store, manage, and autofill passwords and passkeys across devices and browsers. Dashlane enhances online security by generating strong, unique passwords and protecting sensitive login information from cyber threats. The platform also includes features such as dark web monitoring, secure digital wallet for payment information, and seamless password sharing with trusted contacts. With its intuitive interface and robust encryption, Dashlane simplifies credential management while ensuring privacy and protection. It supports multi-factor authentication and provides centralized control for IT teams to enforce security policies across organizations. Dashlane’s cross-platform compatibility and real-time breach alerts help users stay ahead of potential risks, making it an essential tool for improving digital security and productivity in both personal and professional environments.

4.0(126)
Cloudflare logo

Cloudflare

Cloudflare is a comprehensive web infrastructure and security company that provides a suite of services designed to enhance the performance, security, and reliability of internet properties. By leveraging a global network, Cloudflare accelerates websites, APIs, and applications while protecting them from cyber threats such as DDoS attacks, data breaches, and malicious bots. Their platform simplifies network management by integrating content delivery, DNS, firewall, and load balancing into a single solution. Cloudflare also supports secure remote work by optimizing and safeguarding employee access to applications and networks. With a focus on reducing complexity and cost, Cloudflare enables businesses to connect, protect, and build digital experiences anywhere in the world, ensuring fast, secure, and reliable online presence for enterprises of all sizes.

No reviews yet
EMSA Group Security Services Provider logo

EMSA Group Security Services Provider

EMSA Group Security Services Provider is Melbourne's premier security company offering comprehensive security solutions tailored to meet diverse client needs. Specializing in professional security personnel deployment, EMSA Group ensures the safety and protection of commercial, residential, and event environments. Their services include on-site security guards, mobile patrols, alarm response, and risk assessment consultations, all designed to mitigate threats and maintain secure premises. With a commitment to excellence, EMSA Group employs highly trained security professionals equipped with the latest technology and industry best practices. Their client-centric approach emphasizes reliability, responsiveness, and customized security strategies, making them a trusted partner for businesses and individuals seeking robust security services in Melbourne and surrounding areas.

No reviews yet
Qualys logo

Qualys

Qualys is a comprehensive cloud-based cybersecurity and compliance platform designed to help organizations identify, manage, and remediate cyber risks across their entire IT infrastructure. By providing continuous security and vulnerability assessments, Qualys enables businesses to detect threats in real-time and prioritize remediation efforts effectively. The platform offers a suite of integrated tools including vulnerability management, asset discovery, policy compliance, web application scanning, and threat intelligence. Its scalable SaaS architecture ensures seamless deployment and easy integration with existing security workflows, empowering enterprises to maintain robust security postures and meet regulatory requirements. Qualys supports proactive risk mitigation by delivering actionable insights and automated reporting, helping organizations reduce their attack surface and protect critical assets from evolving cyber threats.

4.3(116)