130 CyberArk Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “The cloud is powering a wave of real estate technology disruption. Yet despite its many benefits, the cloud’s multiplier effect has created exponentially more privileged account credentials and secrets that are highly targeted by attackers and need to be properly managed and protected.”

  • “Selecting CyberArk was definitely the right decision. By introducing the CyberArk Privileged Account Security Solution, we were able to significantly improve process quality and meet statutory requirements more efficiently.”

  • “We have a mix of different IT platforms from legacy technologies, SQL databases and Linux to Windows and services in cloud providers, and we have not seen one scenario where we could not integrate CyberArk.”

  • "We needed to critically address three security requirements from a global perspective: least privilege, patch management and application control; CyberArk covers two of these for us very nicely having CyberArk Endpoint Privilege Manager takes away most of the guesswork for the ‘can I install, should I install this, is this ok’ kind of questions and it allows us to have a more secure environment."

  • "It is critical to our overall security strategy because most attacks take place with stolen credentials. Cyberark helps by adding layers of security that would make it more difficult for an attacker to get through."

  • "Securing privileged credentials is a cornerstone to building a secure infrastructure and cyberark is an integral tool to accomplish this."

  • "Faster installation and configuration than its competitors. More built-in templates for systems management. Secure by default and very reliable."

  • "CyberArk is a critical part of our defense and in-depth strategy because it enables us to lock down, control, monitor, and audit our keys to the kingdom."

  • "A core part of the business case for selecting CyberArk was the potential to go on and sell this as a hosted service to our customers. With such an effective solution offered by CyberArk complementing our existing services, we believe we are in a strong position to enable our customers to better meet compliance regulations and audits through the provision of privileged access, critical for any organization."

  • "One of great things about CyberArk is that its solutions act as a facilitator for the IT department – replacing a lengthy and laborious process replacing it with a simple, secure and effective system. It is from this solid platform that we have been able to establish such a good relationship with CyberArk, one we look forward to building upon in future."

  • "The CyberArk implementation team was outstanding and things were straightforward and easy to understand with the CyberArk implementation roadmap."

  • "CyberArk PAM-as-a-service provides an enterprise-grade, centralized approach that works well for us. And as a small team, having a 100% cloud-based based solution makes it easy."

  • “We’ve found CyberArk can centrally manage, collect and report on privileged access activity for us. With Policy and Architecture teams on our side, we’re collaboratively designing controls and evolving policies — bringing them into close alignment to drive internal adoption, and potentially, better protect the organization.”

  • “We built roles based on business rules, departments or divisions in Workday, and then used inbound provisioning from Workday to Active Directory with the former serving as the ‘source of truth’ for all users. Today, everything that happens downstream is automated and driven by the business rules surrounding a Workday value that's synchronized through Active Directory.”

  • “For employees worldwide, the access to applications — without being aware of the authentication — has greatly improved productivity and utilization of those applications.”