TechValidate Research on CyberArk Products

74 TechFacts – Page 2 of 3


CyberArk Customer Satisfaction Rating

An Engineer at a large enterprise insurance company would be very likely to recommend CyberArk for this reason:

CyberArk is easy to use, well supported, and all around a good product/company.

CyberArk Customer Testimonial

It’s more than just rotating passwords, it’s how/where they are used, with an eye towards hashes and SSH keys.

IT Architect, Large Enterprise Financial Services Company

CyberArk Customer Testimonial

CyberArk’s EPM (Endpoint Privilege Manager) solution fits several needs for our company and seems to be a quality product – it provides a much better overall security posture for our company.

System Administrator, Large Enterprise Automotive & Transport Company

CyberArk Customer Testimonial

Prior to adopting a password manager, shared/service account passwords were simple, widely shared, and almost never changed. The passwords are now randomly generated and rotated on a schedule. We are working towards system owners not even needing to see the passwords.

Engineer, Large Enterprise Insurance Company

CyberArk Customer Testimonial

Working in the finance industry it is paramount that we as an organization protect privileged accounts that have access to customer PII. CyberArk has helped us to rotate credentials to privileged accounts and utilize strong passwords making it difficult for attackers to infiltrate and escalate privileges.

A CyberArk User

CyberArk Customer Satisfaction Rating

A Security Manager at a Global 500 insurance company would be likely to recommend CyberArk for this reason:

I have learned a lot from the EPV (Enterprise Password Vault), and the support I get from the various CyberArk modules.

CyberArk Customer Satisfaction Rating

An Engineer at a Global 500 telecommunications services company would be very likely to recommend CyberArk for this reason:

For what CyberArk does, it does it easily and quickly and makes it easy for end users to understand and pick up quickly.

CyberArk Customer Satisfaction Rating

An IT Analyst at a Global 500 chemicals company would be very likely to recommend CyberArk for this reason:

CyberArk’s Enterprise Password Vault is a very secure password management solution.

CyberArk Customer Satisfaction Rating

An IT Analyst at a Global 500 insurance company would be likely to recommend CyberArk for this reason:

CyberArk is very easy to work with and has done a good job with the support of the product.

CyberArk Customer Satisfaction Rating

An IT Analyst at a Fortune 500 electronics company would be likely to recommend CyberArk for this reason:

CyberArk provides the best solutions to manage privileged high-risk accounts.

CyberArk Customer Satisfaction Rating

An IT Analyst at a medium enterprise financial services company would be very likely to recommend CyberArk for this reason:

CyberArk is the best tool out there to protect privileged accounts.

CyberArk Customer Testimonial

Threats can come from inside and we want to mitigate our risks. Changing the passwords more frequently has helped us to do this – I think CyberArk is a great tool for managing passwords.

IT Analyst, Fortune 500 Industrial Manufacturing Company

CyberArk Customer Satisfaction Rating

Large Enterprise Insurance Company

CyberArk is an excellent resource for protecting and managing privileged accounts in the corporate environment.

CyberArk Customer Satisfaction Rating

An IT Professional at an S&P 500 financial services company would be likely to recommend CyberArk for this reason:

I think CyberArk is one of the most comprehensive PAS (Privileged Access Security) solutions out there on the market with a lot of out-of-the box integration.

CyberArk Customer Satisfaction Rating

An Information Systems Security Analyst would be very likely to recommend CyberArk for this reason:

In my experience, CyberArk PAS (Privileged Access Security) provides the most effective enterprise level solution for securing privileged account credentials.

CyberArk Customer Testimonial

Old-school IT security focused almost exclusively on perimeter but the attack vector has shifted in the past decade to focus on internal threats via phishing, social engineering, etc. The combination of securely vaulting privileged credentials, requiring MFA access, session recording and isolation, and SIEM integration best protects our privileged accounts.

IAM/PAM Consultant, SecureITSource

CyberArk Customer Testimonial

Eliminating the ability for intruders to move laterally through the environment in the event of a breach is critical in reducing data loss. Using CyberArk to harden the most critical credentials in the organization helps us to enforce stronger layered security.

IT Vice President, Large Enterprise Banking Company

CyberArk Customer Testimonial

Learning more about CyberArk, attending conferences/forums, and webinars have really helped us to think like an attacker and pull off the blinders around how vulnerable our systems really are.

IT Administrator, S&P 500 Energy & Utilities Company

CyberArk Customer Testimonial

Privileged accounts are the keys to the kingdom: they need to be kept secure and passwords rotated on a regular basis to make it harder for attackers.

IT Analyst, Global 500 Insurance Company

CyberArk Customer Testimonial

Introducing the automated password rotation into an environment that had stale passwords (due to the previous requirement of manual password changes) has freed us up to focus on the actual security events and also reduces the risk of exposure to this additional attack vector.

Engineer, S&P 500 Professional Services Company

CyberArk Customer Testimonial

A great product for privileged identity management, CyberArk has provided a way to look forward and deep-dive into the privileged identity problem!

IT Specialist, Deutsche Bank AG

CyberArk Customer Testimonial

CyberArk is becoming more and more critical in our day-to-day environment.

Senior IT Architect, Large Enterprise Financial Services Company

CyberArk Customer Testimonial

With CyberArk we secure accounts in order to make lateral movement much less likely.

Engineer, S&P 500 Banking Company

CyberArk Customer Testimonial

With CyberArk, by eliminating the need for individual network engineers to access the privileged account passwords to accomplish their mission, we have eliminated the passive storing of passwords by the teams. No password spreadsheets means more secure passwords.

Information Systems Security Analyst, Large Aerospace Corporation

CyberArk Customer Testimonial

There is very little you can do to secure domain administrators out of the box, CyberArk has helped us secure those credentials and much more. From an auditing standpoint it’s much better to be able to say we cycle passwords daily vs. we have no policy.

System Administrator, Educational Institution

CyberArk Customer Testimonial

Privileged accounts are one of the primary attack vectors and needs security and governance. In a very large and agile enterprise environment, a tool to manage, control and audit the usage of privileged accounts is absolutely mandatory.

IT Architect, Large Enterprise Automotive & Transport Company

CyberArk Customer Testimonial

Most attacks currently try and use ‘pass the hash’. We are working to stop this attack vector using CyberArk.

Security Officer, PwC

CyberArk Customer Testimonial

Keeping privileged credentials stored in the vault and auto managed makes it virtually impossible for an attacker to steal the credentials. In the case that vaulted credentials do become compromised, we utilize aggressive rotation policies so the password is not even good for more than a business day.

IT Analyst, Global 500 Mechanical and Industrial Engineering Company

CyberArk Customer Testimonial

CyberArk enabled us to adopt and develop a model for privileged access and configuration which was not possible before, resulting in an overall reduction in the number of accounts holding privileges.

IT Architect, Global 500 Insurance Company

CyberArk Customer Testimonial

CyberArk works by applying solutions to avoid the most common cyber attacks and unwanted or even malicious insiders to break through our infrastructure.

IT Analyst, Large Enterprise Industrial Manufacturing Company




More Research on CyberArk Products