CyberArk Access Manager Logo
CyberArk Access Manager Logo
CyberArk Software

CyberArk Access Manager

Composite Score
7.7 /10
CX Score
7.8 /10
Category
CyberArk Access Manager
7.7 /10

What is CyberArk Access Manager?

When everything is transforming digitally – from your industry to the threats you face – you need identity Access Management (IAM) solutions designed to outpace any security risks that challenge your ability to compete.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

CyberArk Access Manager won the following awards in the Identity and Access Management category

Filter By

CyberArk Access Manager Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on CyberArk Access Manager.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

84 Likeliness to Recommend

1
Since last award

100 Plan to Renew

72 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+87 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love CyberArk Access Manager?

8% Negative
3% Neutral
89% Positive

Pros

  • Efficient Service
  • Includes Product Enhancements
  • Reliable
  • Saves Time

Feature Ratings

Average 81

Reporting

89

Multi-Factor Authentication (MFA)

86

Identity Governance

84

Activity Monitoring Alerts

83

Password Management

82

Privileged Access Management

80

Access Request Management

78

Advanced Provisioning

78

Mobility Support

77

Provisioning Deprovisioning

77

Web Cloud Single Sign on (SSO)

75

Vendor Capability Ratings

Average 76

Ease of Implementation

85

Ease of IT Administration

79

Vendor Support

79

Breadth of Features

78

Ease of Data Integration

77

Quality of Features

76

Availability and Quality of Training

76

Business Value Created

75

Ease of Customization

73

Usability and Intuitiveness

69

Product Strategy and Rate of Improvement

68

CyberArk Access Manager Reviews

Vaibhav P.

  • Role: C-Level
  • Industry: Consulting
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Feb 2024

Strong security, usability could improve.

Likeliness to Recommend

9 /10

What differentiates CyberArk Access Manager from other similar products?

CyberArk Application Identity Manager stands out with its unique focus on securing application access. It offers granular controls, seamless integration, scalability, and comprehensive auditing. This tailored approach ensures robust privileged access management for applications, making it a standout solution in the market.

What is your favorite aspect of this product?

My favorite aspect of CyberArk Application Identity Manager is its granular access controls tailored specifically for applications. This feature ensures that organizations can enforce least privilege policies effectively, reducing the risk of unauthorized access and potential security breaches. By providing such fine-grained control over application access, CyberArk Application Identity Manager helps organizations enhance their overall security posture and mitigate the risk of cyber threats.

What do you dislike most about this product?

One aspect of CyberArk Application Identity Manager that I find challenging is its learning curve. The initial setup and configuration process can be complex, requiring a good understanding of the product's capabilities and how it integrates with existing systems. Additionally, some users may find the interface somewhat overwhelming at first, which could hinder adoption and usability, especially for less experienced users. However, with proper training and support, these challenges can be overcome, allowing organizations to fully leverage the security benefits offered by CyberArk Application Identity Manager.

What recommendations would you give to someone considering this product?

When considering CyberArk Application Identity Manager, it's crucial to thoroughly assess your organization's needs for privileged access management (PAM) in the context of applications. Plan your implementation carefully, including integration with existing systems and user training. Starting with a pilot deployment can help evaluate its performance before full-scale implementation. Take advantage of training resources and support from CyberArk to address any challenges effectively. Stay informed about updates to maximize the benefits of the product and ensure ongoing security.

Pros

  • Acts with Integrity
  • Reliable
  • Performance Enhancing
  • Enables Productivity

Jorge F.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Jan 2023

Secure, easy to use and configure

Likeliness to Recommend

10 /10

What differentiates CyberArk Access Manager from other similar products?

This product allow SSO integration that is a very importan feature nowadays also the capability to integrate with orchestrator for provision servers generating and storing secrets from start to end

What is your favorite aspect of this product?

intuitive user-friendly interface for the end user, flexibility and easy integration with other automation tools, also the automation of the password rotation proccess

What do you dislike most about this product?

Constant maintance of safety protocols and keeping this updated with the copany policy

What recommendations would you give to someone considering this product?

Configure high availabilite since it's a cloud base application, wont rely all the responsability on the cloud vendor

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Trustworthy

SHAHRUKH K.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Jan 2023

Feature of the asset

Likeliness to Recommend

7 /10

What differentiates CyberArk Access Manager from other similar products?

yberArk Application Identity Manager is a privileged access management (PAM) solution that is specifically designed to protect and manage application credentials and secrets. Some of the key features and capabilities that differentiate CyberArk Application Identity Manager from other similar products include: CyberArk Application Identity Manager allows organizations to discover, secure, rotate and control access to privileged credentials used by applications and services.

What is your favorite aspect of this product?

Easy to use and very useful

What do you dislike most about this product?

As a language model, I do not have personal preferences or experiences with specific software. However, CyberArk Application Identity Manager (AIM) like any other software, it may have some limitations or drawbacks that some users might not find Complexity in the implementation and management of the solution. High costs associated with the implementation and maintenance of the solution. Limited scalability and the need for additional resources to manage the solution. Lack of integration with other third-party tools. Limited support fo

What recommendations would you give to someone considering this product?

recommendations to keep in mind: Clearly define your requirements and use cases: Understand the specific challenges that you are facing and how CyberArk AIM can address them. Assess your current environment: It is important to understand the current state of your IT infrastructure and how CyberArk AIM will integrate with it. Evaluate the costs: Assess the total cost of ownership, including the costs of the software, hardware, and any additional resources required to implement and maintain the solution.

Pros

  • Efficient Service
  • Saves Time
  • Performance Enhancing
  • Unique Features

Cons

  • Less Transparent
  • Vendor's Interest First
  • Vendor Friendly Policies

Most Popular CyberArk Access Manager Comparisons