Menu

TechValidate Research on CyberArk

These pages present data that TechValidate has sourced via direct research with verified customers and users of CyberArk. TechValidate stands behind the authenticity of all published data. Learn more »



164 Customers Surveyed

1,395 Data Points Collected

70 Published TechFacts

60 Published Case Studies



Selected Research Highlights


CyberArk Customer Testimonial

Learning more about CyberArk, attending conferences/forums, and webinars have really helped us to think like an attacker and pull off the blinders around how vulnerable our systems really are.

IT Administrator, S&P 500 Energy & Utilities Company

CyberArk Customer Testimonial

CyberArk enabled us to adopt and develop a model for privileged access and configuration which was not possible before, resulting in an overall reduction in the number of accounts holding privileges.

IT Architect, Global 500 Insurance Company

CyberArk Case Study

Case Study: Medium Enterprise Banking Company

Introduction

This case study of a medium enterprise banking company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Failed an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Local admin accounts on workstations
    • Application credentials
    • Secrets used by DevOps tools
    • Service accounts
    • SSH keys
    • Robotic process automations
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • DevOps (Docker, Chef, Puppet)
    • Robotic process automation (BluePrism, UI path)
    • SIEM (Splunk, Fortinet, LogRhythm)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has stayed the same.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has stayed the same.

CyberArk Case Study

Case Study: Global 500 Insurance Company

Introduction

This case study of a Global 500 insurance company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Privileged accounts are the keys to the kingdom. They need to be kept secure and passwords rotated on a regular basis to make it harder for attackers.”

“CyberArk is very easy to work with and has done a good job with the support of the product.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • Too many endpoints with local administrator privileges
    • Changing root password on large number of unix\linux servers
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
  • Selected a solution for privileged access security to:
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Local admin accounts on workstations
    • Application credentials
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • Identity and access (Sailpoint, RSA)
    • Robotic process automation (BluePrism, UI path)

“CyberArk is very easy to work with and has done a good job with the support of the product.”

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced a lot.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.


More to Explore



About CyberArk

CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world’s leading companies — including more than 45% of the Fortune 100 companies — to protect their highest-value information assets, infrastructure and applications.

CyberArk Website   CyberArk Website