130 CyberArk Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “Security at our organization has enhanced because CyberArk’s Identity Security solutions help us protect all types of identities, both human and machine, and improve visibility. In information security, we cannot protect what we cannot see, but now we can see, capture, and forensically analyze privileged access. That is a huge benefit.”

  • “With CyberArk we have a solution that I trust to protect our customers, partners, users and business assets. If for instance, the identity of someone in finance is stolen, CyberArk ensures they are not then able to gain domain administration access. CyberArk gives me the opportunity to know exactly what is happening in my IT infrastructure at all times.”

  • “Identity-centric security is important because many organizations are moving from on-premises to the cloud, which in turn, proliferates the number of credentials and privileges that need to be protected. Before, we protected IT assets and had a security perimeter to protect information. But information is now processed in many different places and the simplest, most cost-effective and most impactful way of protecting it is securing digital identities that have access to the system. I do not care about laptops, phones and tablets or location. What is important are the identities that access services and their privileges.”

  • “With a mixture of old and new IT environments, J-SOX compliance and internal control efforts tend to leave issues unresolved. In particular, management of privileged access to systems and security measures were one of our key issues. In the process of reforming the old architecture to the new architecture, we are implementing various enhancements, such as zero-trust-based security operations, a shift from perimeter security to user-based security, and enhancement of asset management and log management for quick incident response. We are working to elevate our security measures to realize cloud-native IT that can digitally connect users in the future.”

  • "CyberArk is a complete identity security solution that is built to satisfy a wide range of audit requirements. It is also a good choice for us because it provides consistent management across multiple platforms. Since the number of users accessing each system is completely different, one of the advantages of CyberArk is that it offers a flexible licensing structure in terms of the number of simultaneous connections."

  • “With CyberArk, we have better visibility into who is accessing what and worry less about privileged access. Now we focus on delivering high-value customer service and experience improvements. With CyberArk, we are getting users to a state where they do not log into devices until and unless there is a need – such as a change, service request or incident. This is something we can enforce and monitor via CyberArk, and which is helping in risk reduction and achieving operational efficiency.”

  • “Management recognized that strengthening security was essential in promoting digital transformation. Initially, there were various lacks in security measures, but since establishing the ICT Promotion Division in 2018, we have worked to build a solid security infrastructure, both technically and in terms of management and operations.”

  • “User experience became an advantage of CyberArk Privilege Cloud.”

  • “Netron was planning on introducing a PAM strategy mainly due to the company’s realization that manual management of privileged accounts could not effectively prevent human errors, protect privileged credentials and offer robust audit capabilities. We decided to introduce commercial solutions to reduce operational and maintenance (O&M) costs, ensure effective operational management, and significantly improve security.”

  • “In the face of evolving cyber threats, our commitment to preserve the trust of our customers led us to rethink traditional security measures. We realized that in a world where digital identities are proliferating and privilege boundaries are fully circumvented, adopting a zero-trust approach with time-based access would dramatically reduce the attack surface.”