“Perhaps one of the most significant advantages of the Sensitive Information Management Solution is business enablement. The flexibility of CyberArk’s solutions enables us to establish processes and deliver Sensitive Information Management Solution-based services without requiring our customers to change the way they work.”
“With PCI compliance as a significant business driver, specifically for our e-commerce business, we turned to CyberArk to get our user and hard-coded application passwords under control, while at the same time being able to enforce new security policies built to protect our customers.”
“When we process our cybersecurity insurance, applications and renewals, the fact that we have CyberArk and a privileged access management program makes the application easier.”
“We liked how easy it was to manage secrets on Red Hat OpenShift using CyberArk’s secrets management platform.”
"Getting all those servers in, the accounts in place, by the deadline — even just installing it — was all an immediate win. People said it couldn’t be done."
"Now, we finally have everybody into least privileged and auditing through PSM, which has been fantastic."
"With conventional local administrative access, you have no insight into how users are using that access. With Endpoint Privilege Manager, we have the ability to see how they’re using that and then lock down things that aren’t appropriate or are not allowed in our company."
“We’ve noted a significant reduction in service desk calls, and that has freed up our IT team to focus on rolling out additional apps that further help get the job done faster and more efficiently. Most importantly, Idaptive really enabled us to move our base applications to the cloud. We found the product easy to use, intuitive, and easy to install."
“We needed an MDM solution to ensure that we could enforce passwords on devices, that mobile communication would be encrypted, and that we could eliminate proprietary SBA Communications email from any mobile device at a moment’s notice. We needed to accomplish all that without damaging the device or deleting personal information. And last, we needed control and reporting on all mobile devices connecting to our servers. Because those capabilities are inherent to Idaptive, we realized we wouldn’t even need a separate MDM solution.”
“We provisioned a couple of additional internal apps and then rolled it out to the rest of the organization by letting Idaptive claim federation for the additional domains. It took about two hours for the changes to be replicated throughout the organization and we began seeing users register through the Idaptive dashboard without any issues.”
“Our remote users are leveraging CyberArk Identity Adaptive Multi-Factor Authentication to gain access. It has simplified the process for them, made us more secure and also helped us to maintain compliance with GLBA regulations.”
“We were already using a mobile device management product prior to Idaptive, but it made sense to consolidate all identity management in one place, especially since it would alleviate further pressure from IT with one less product to manage, and save on the costs of a separate security solution.”
"The fact that your single sign-on provider can also be your mobile device management provider and your multi-factor authentication provider is definitely a positive. In modern IT, you have to cover a lot of bases with a lot of overlap, and dealing with one vendor rather than two or three is optimal."
"Idaptive eased the transition to Office 365 significantly. It was a matter of minutes and we were federated. It's incredibly easy to deploy an app and make it available to users. I can't say enough about how valuable it's been for us."
"When I recommend a service provider to my clients, I want to be certain that once we’re up and running, the client will be fully supported by the vendor. Our experience with Idaptive has assured me of that."