130 CyberArk Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “The PAM training course was a great enrichment for me in order to prepare myself in being a valuable responsible for future questions on CyberArk PAM. [The instructor] has done a great job within these 4 days to get a person like me to an Enthusiast for PAM with CyberArk Solutions.”

  • “The need to ensure more secure and efficient access management for users across our workstations and critical business applications drove the decision to use CyberArk EPM. We can now meet the insurance industry’s stringent compliance demands more effectively. It also means we can protect our people and IT systems, optimize operations, reduce costs, and most importantly, protect our customers and their financial information.”

  • “CyberArk stopped password sharing and helped us to achieve regulatory compliance. It has also strengthened the security of legacy systems and removed weaknesses such as hardcoded passwords.”

  • “Overall, our team has benefited a great deal from the ease of- use and related efficiencies afforded by the CyberArk Privileged Account Security Solution.”

  • "We needed to critically address three security requirements from a global perspective: least privilege, patch management and application control; CyberArk covers two of these for us very nicely having CyberArk Endpoint Privilege Manager takes away most of the guesswork for the ‘can I install, should I install this, is this ok’ kind of questions and it allows us to have a more secure environment."

  • "It is critical to our overall security strategy because most attacks take place with stolen credentials. Cyberark helps by adding layers of security that would make it more difficult for an attacker to get through."

  • "Securing privileged credentials is a cornerstone to building a secure infrastructure and cyberark is an integral tool to accomplish this."

  • "Faster installation and configuration than its competitors. More built-in templates for systems management. Secure by default and very reliable."

  • "CyberArk is a critical part of our defense and in-depth strategy because it enables us to lock down, control, monitor, and audit our keys to the kingdom."

  • "A core part of the business case for selecting CyberArk was the potential to go on and sell this as a hosted service to our customers. With such an effective solution offered by CyberArk complementing our existing services, we believe we are in a strong position to enable our customers to better meet compliance regulations and audits through the provision of privileged access, critical for any organization."

  • "One of great things about CyberArk is that its solutions act as a facilitator for the IT department – replacing a lengthy and laborious process replacing it with a simple, secure and effective system. It is from this solid platform that we have been able to establish such a good relationship with CyberArk, one we look forward to building upon in future."

  • "The CyberArk implementation team was outstanding and things were straightforward and easy to understand with the CyberArk implementation roadmap."

  • "CyberArk PAM-as-a-service provides an enterprise-grade, centralized approach that works well for us. And as a small team, having a 100% cloud-based based solution makes it easy."

  • “We’ve found CyberArk can centrally manage, collect and report on privileged access activity for us. With Policy and Architecture teams on our side, we’re collaboratively designing controls and evolving policies — bringing them into close alignment to drive internal adoption, and potentially, better protect the organization.”

  • “We built roles based on business rules, departments or divisions in Workday, and then used inbound provisioning from Workday to Active Directory with the former serving as the ‘source of truth’ for all users. Today, everything that happens downstream is automated and driven by the business rules surrounding a Workday value that's synchronized through Active Directory.”