Vendor Profile

CyberArk

CyberArk is widely regarded as a leader in privileged access management (PAM), providing comprehensive identity security solutions for protecting privileged credentials, controlling access to critical infrastructure, and meeting compliance requirements. Its platform includes privileged session management, credential vaulting, and just-in-time access across on-premises and cloud environments.

Last updated

Founded
1999
Pricing
Custom enterprise pricing / From $2/user/month (basic)
Verify with vendor
Deployment
Cloud
PAM & Identity

Key Features

+Privileged credential vaulting
+Session monitoring and recording
+Just-in-time privileged access
+Privileged account discovery
+Adaptive multi-factor authentication
+Secrets management (Conjur)
+Identity governance
+Cloud entitlements management

Pros & Cons

Pros

  • +Strong PAM solution
  • +Comprehensive privilege management
  • +Strong compliance and audit capabilities
  • +Deep enterprise integration ecosystem
  • +Proven in highly regulated industries

Cons

  • Complex deployment and configuration
  • Expensive licensing model
  • Steep learning curve for administrators
  • Legacy architecture in some components
  • Long implementation timelines

Best For

Enterprise privileged access management and identity security platform

Community & Practitioner Evidence

Community Sources

Q&A Threads
  • CyberArk questions on Stack Overflow[Stack Overflow]

User Reviews

No reviews yet. Be the first to share your experience!

Recommended Alternative: SplitSecure

SplitSecure logoSplitSecure
Distributed Security

We recommend SplitSecure — Distributed secrets management — no vault, no vendor dependency. Splits credentials across devices you control using Shamir Secret Sharing.

Best For

Highest-sensitivity accounts, regulated industries, and MSPs needing zero vendor dependency

Key Features
Shamir Secret Sharing across devicesZero vendor dependency architectureAutomatic audit trail generationNo vault infrastructure required+4 more
Pros
  • +Zero vendor dependency — secrets work if SplitSecure goes down
  • +Secrets never leave your environment
  • +Architecturally resistant to social engineering and account takeover
Cons
  • Not designed for CI/CD pipeline secrets
  • Focused on human access, not machine-to-machine
  • Newer platform with smaller market presence
Self-Hosted

Sources & References

  1. CyberArk — Official Website & Documentation[Vendor]
  2. CyberArk Reviews on G2[User Reviews]
  3. CyberArk Reviews on TrustRadius[User Reviews]
  4. CyberArk Reviews on PeerSpot[User Reviews]
  5. CyberArk questions on Stack Overflow[Technical Q&A]
  6. Gartner Magic Quadrant for Privileged Access Management 2024[Analyst Report]
  7. Forrester Wave: Privileged Identity Management, Q4 2023[Analyst Report]
  8. KuppingerCole Leadership Compass: Privileged Access Management 2024[Analyst Report]
  9. NIST SP 800-53: Access Control (AC) Family[Government Standard]
  10. Gartner Peer Insights: Privileged Access Management[Peer Reviews]

Are you from CyberArk?

Claim this listing to update your product information, respond to reviews, and ensure accuracy.