4.1 out of 5 (39 Ratings)
May 23, 2017
CyberArk tured out to be very easy to deploy globally across the organization. The client install was relatively small, making it fairly trivial to deploy via Group Policy. We had several thousand installations, nearly all of them done remotely and by GPO, with almost zero issues. Support was excellent and we were able to deploy in a way that didn't cause disruption. Having said that, it is up to local Op Co IT leaders to actually configure and put into practice this new tool. But that model is part of the beauty of the solution. Getting the product installed in so many endpoints could have been the difficult part, but it wasn't. This leaves our IT resources free to actually train on it and deploy the solution in the manner that best suits their respective businesses.
May 12, 2017
We are overall very satisfied with the implementation of the tool in the ecosystem of privileged access management tools we use. We are looking to expand this to cloud platforms.
Apr 26, 2017
While not easy to setup, it is comprehensive and flexible
Apr 21, 2017
Responds when needed.
Apr 11, 2017
Works as explained in the manual
Mar 22, 2017
The Engineer that CyberArk assigned to us was very knowledgable. Their ongoing support has also been excellent.
Mar 14, 2017
The product was reliable and stable with no issues. Consulting was a bit green and afterward you could tell the company had some growing pains. I appeared that the professional services were stretched thin and we did not get the attention that was expecting.
Mar 8, 2017
Very pleased with the vendor support. Cyberark has an exceptional 'customer success' team that act as a professional service-lite organization, except their support services are free. The product is very good at delivery said functionality. Usability has come along a great deal since 2012. Very flexible today, and almost transparent in certain deployments.
Feb 21, 2017
vendor very supportive, product works as expected
Feb 16, 2017
Cyberark's breadth and depth of experience in this technology area coupled with the maturity of the product and offerings made it easy for us to select them as our solution for Privileged Identity Management.