

What is CyberArk Access Manager?
When everything is transforming digitally – from your industry to the threats you face – you need identity Access Management (IAM) solutions designed to outpace any security risks that challenge your ability to compete.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCyberArk Access Manager Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on CyberArk Access Manager.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
84 Likeliness to Recommend
1
Since last award
100 Plan to Renew
72 Satisfaction of Cost Relative to Value
1
Since last award
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+87 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love CyberArk Access Manager?
Pros
- Efficient Service
- Includes Product Enhancements
- Reliable
- Saves Time
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Reporting
Multi-Factor Authentication (MFA)
Identity Governance
Activity Monitoring Alerts
Password Management
Privileged Access Management
Access Request Management
Advanced Provisioning
Mobility Support
Provisioning Deprovisioning
Web Cloud Single Sign on (SSO)
Vendor Capability Ratings
Ease of Implementation
Ease of IT Administration
Vendor Support
Breadth of Features
Ease of Data Integration
Quality of Features
Availability and Quality of Training
Business Value Created
Ease of Customization
Usability and Intuitiveness
Product Strategy and Rate of Improvement
CyberArk Access Manager Reviews

Vaibhav P.
- Role: C-Level
- Industry: Consulting
- Involvement: Business Leader or Manager
Submitted Feb 2024
Strong security, usability could improve.
Likeliness to Recommend
What differentiates CyberArk Access Manager from other similar products?
CyberArk Application Identity Manager stands out with its unique focus on securing application access. It offers granular controls, seamless integration, scalability, and comprehensive auditing. This tailored approach ensures robust privileged access management for applications, making it a standout solution in the market.
What is your favorite aspect of this product?
My favorite aspect of CyberArk Application Identity Manager is its granular access controls tailored specifically for applications. This feature ensures that organizations can enforce least privilege policies effectively, reducing the risk of unauthorized access and potential security breaches. By providing such fine-grained control over application access, CyberArk Application Identity Manager helps organizations enhance their overall security posture and mitigate the risk of cyber threats.
What do you dislike most about this product?
One aspect of CyberArk Application Identity Manager that I find challenging is its learning curve. The initial setup and configuration process can be complex, requiring a good understanding of the product's capabilities and how it integrates with existing systems. Additionally, some users may find the interface somewhat overwhelming at first, which could hinder adoption and usability, especially for less experienced users. However, with proper training and support, these challenges can be overcome, allowing organizations to fully leverage the security benefits offered by CyberArk Application Identity Manager.
What recommendations would you give to someone considering this product?
When considering CyberArk Application Identity Manager, it's crucial to thoroughly assess your organization's needs for privileged access management (PAM) in the context of applications. Plan your implementation carefully, including integration with existing systems and user training. Starting with a pilot deployment can help evaluate its performance before full-scale implementation. Take advantage of training resources and support from CyberArk to address any challenges effectively. Stay informed about updates to maximize the benefits of the product and ensure ongoing security.
Pros
- Acts with Integrity
- Reliable
- Performance Enhancing
- Enables Productivity
Please tell us why you think this review should be flagged.

Jorge F.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Development, Integration, and Administration
Submitted Jan 2023
Secure, easy to use and configure
Likeliness to Recommend
What differentiates CyberArk Access Manager from other similar products?
This product allow SSO integration that is a very importan feature nowadays also the capability to integrate with orchestrator for provision servers generating and storing secrets from start to end
What is your favorite aspect of this product?
intuitive user-friendly interface for the end user, flexibility and easy integration with other automation tools, also the automation of the password rotation proccess
What do you dislike most about this product?
Constant maintance of safety protocols and keeping this updated with the copany policy
What recommendations would you give to someone considering this product?
Configure high availabilite since it's a cloud base application, wont rely all the responsability on the cloud vendor
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Trustworthy
Please tell us why you think this review should be flagged.

SHAHRUKH K.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Development, Integration, and Administration
Submitted Jan 2023
Feature of the asset
Likeliness to Recommend
What differentiates CyberArk Access Manager from other similar products?
yberArk Application Identity Manager is a privileged access management (PAM) solution that is specifically designed to protect and manage application credentials and secrets. Some of the key features and capabilities that differentiate CyberArk Application Identity Manager from other similar products include: CyberArk Application Identity Manager allows organizations to discover, secure, rotate and control access to privileged credentials used by applications and services.
What is your favorite aspect of this product?
Easy to use and very useful
What do you dislike most about this product?
As a language model, I do not have personal preferences or experiences with specific software. However, CyberArk Application Identity Manager (AIM) like any other software, it may have some limitations or drawbacks that some users might not find Complexity in the implementation and management of the solution. High costs associated with the implementation and maintenance of the solution. Limited scalability and the need for additional resources to manage the solution. Lack of integration with other third-party tools. Limited support fo
What recommendations would you give to someone considering this product?
recommendations to keep in mind: Clearly define your requirements and use cases: Understand the specific challenges that you are facing and how CyberArk AIM can address them. Assess your current environment: It is important to understand the current state of your IT infrastructure and how CyberArk AIM will integrate with it. Evaluate the costs: Assess the total cost of ownership, including the costs of the software, hardware, and any additional resources required to implement and maintain the solution.
Pros
- Efficient Service
- Saves Time
- Performance Enhancing
- Unique Features
Cons
- Less Transparent
- Vendor's Interest First
- Vendor Friendly Policies
Please tell us why you think this review should be flagged.
Get Instant Access<br>to this Report
Get Instant Access
to this Report
Unlock your first report with just a business email. Register to access our entire library.
© 2025 SoftwareReviews.com. All rights reserved.
