130 CyberArk Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “Prior to implementing CyberArk, if there was a compromise, we had no efficient way of uncovering what occurred or knowing what needed to be done to remediate the situation.”

  • “The development environment centered on a server is accessed by engineers from individual PC terminals. The server, where all kinds of data are concentrated, is the place that must be protected the most. With a few exceptions, the personnel for each project in charge of servers is not IT professionals but application programmers who also have game development tasks. The development environment is mainly Linux servers, and not everyone is familiar with the operation. Therefore, there was a risk that account management would inevitably become sloppy. Implementing a privileged access management solution was one of our most urgent and important tasks.”

  • “The CyberArk Identity Security Platform is a great tool for providing simple and secure access to our staff. By removing the burden of creating and remembering passwords and offering seamless, one-click access, we are improving productivity and enhancing our security posture.”

  • “From a security perspective, using CyberArk is the best approach because there is now only one source/point of connection. We no longer have to manage multiple points of access. With CyberArk in place, we’ve simplified the process of managing security.”

  • "So far I like what I have seen from the product, and the team behind it takes us seriously when we make suggestions. The admin console is simple to navigate and I can make significant changes to our operating environment in a matter of moments.”

  • “CyberArk addressed all of our organizational and operational needs around privileged account security. They answered all of our questions and provided the perfect framework for protecting our organization.”

  • “CyberArk makes the whole process painless to the end user. Their solution is extremely intuitive and easy to set up. The solution protects all of our admin and privileged accounts and enables us to tout our strengthened Smart Card security posture to all of our customers.”

  • “With PCI compliance as a significant business driver, specifically for our e-commerce business, we turned to CyberArk to get our user and hard-coded application passwords under control, while at the same time being able to enforce new security policies built to protect our customers.”

  • “We were able to set up a secure chain of trust between us, our clients, and their trusted advisors, with almost no effort on our part.”

  • “Perhaps one of the most significant advantages of the Sensitive Information Management Solution is business enablement. The flexibility of CyberArk’s solutions enables us to establish processes and deliver Sensitive Information Management Solution-based services without requiring our customers to change the way they work.”

  • “Now, our executives are confident that they can share confidential information electronically. And it’s very easy for us to control and manage.”

  • “In CyberArk, we’ve found a single, scalable solution to reduce risk, address all of our unique requirements and significantly enhance the TOTVS cloud platform.”

  • “As we progress along this digital transformation journey, it has never been more important to align security and risk postures across new tools and technologies.”

  • “CyberArk stopped password sharing and helped us to achieve regulatory compliance. It has also strengthened the security of legacy systems and removed weaknesses such as hardcoded passwords.”

  • “The cloud is powering a wave of real estate technology disruption. Yet despite its many benefits, the cloud’s multiplier effect has created exponentially more privileged account credentials and secrets that are highly targeted by attackers and need to be properly managed and protected.”