130 CyberArk Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “Selecting CyberArk was definitely the right decision. By introducing the CyberArk Privileged Account Security Solution, we were able to significantly improve process quality and meet statutory requirements more efficiently.”

  • “We were already using a mobile device management product prior to Idaptive, but it made sense to consolidate all identity management in one place, especially since it would alleviate further pressure from IT with one less product to manage, and save on the costs of a separate security solution.”

  • “CyberArk Privilege Cloud solution can identify and prevent incidents sooner, and often before there is any impact on services.”

  • “Overall, our team has benefited a great deal from the ease of- use and related efficiencies afforded by the CyberArk Privileged Account Security Solution.”

  • "We needed to critically address three security requirements from a global perspective: least privilege, patch management and application control; CyberArk covers two of these for us very nicely having CyberArk Endpoint Privilege Manager takes away most of the guesswork for the ‘can I install, should I install this, is this ok’ kind of questions and it allows us to have a more secure environment."

  • "It is critical to our overall security strategy because most attacks take place with stolen credentials. Cyberark helps by adding layers of security that would make it more difficult for an attacker to get through."

  • "Securing privileged credentials is a cornerstone to building a secure infrastructure and cyberark is an integral tool to accomplish this."

  • "Faster installation and configuration than its competitors. More built-in templates for systems management. Secure by default and very reliable."

  • "CyberArk is a critical part of our defense and in-depth strategy because it enables us to lock down, control, monitor, and audit our keys to the kingdom."

  • "A core part of the business case for selecting CyberArk was the potential to go on and sell this as a hosted service to our customers. With such an effective solution offered by CyberArk complementing our existing services, we believe we are in a strong position to enable our customers to better meet compliance regulations and audits through the provision of privileged access, critical for any organization."

  • "One of great things about CyberArk is that its solutions act as a facilitator for the IT department – replacing a lengthy and laborious process replacing it with a simple, secure and effective system. It is from this solid platform that we have been able to establish such a good relationship with CyberArk, one we look forward to building upon in future."

  • "The CyberArk implementation team was outstanding and things were straightforward and easy to understand with the CyberArk implementation roadmap."

  • "CyberArk PAM-as-a-service provides an enterprise-grade, centralized approach that works well for us. And as a small team, having a 100% cloud-based based solution makes it easy."

  • “We’ve found CyberArk can centrally manage, collect and report on privileged access activity for us. With Policy and Architecture teams on our side, we’re collaboratively designing controls and evolving policies — bringing them into close alignment to drive internal adoption, and potentially, better protect the organization.”

  • “We built roles based on business rules, departments or divisions in Workday, and then used inbound provisioning from Workday to Active Directory with the former serving as the ‘source of truth’ for all users. Today, everything that happens downstream is automated and driven by the business rules surrounding a Workday value that's synchronized through Active Directory.”