130 CyberArk Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “CyberArk stopped password sharing and helped us to achieve regulatory compliance. It has also strengthened the security of legacy systems and removed weaknesses such as hardcoded passwords.”

  • “With CyberArk we have a solution that I trust to protect our customers, partners, users and business assets. If for instance, the identity of someone in finance is stolen, CyberArk ensures they are not then able to gain domain administration access. CyberArk gives me the opportunity to know exactly what is happening in my IT infrastructure at all times.”

  • “We have had instances of CyberArk stopping ransomware attacks, so there is the cost avoidance where we have detected and stopped malicious software on the endpoint.”

  • “For employees worldwide, the access to applications — without being aware of the authentication — has greatly improved productivity and utilization of those applications.”

  • “We liked how easy it was to manage secrets on Red Hat OpenShift using CyberArk’s secrets management platform.”

  • "Getting all those servers in, the accounts in place, by the deadline — even just installing it — was all an immediate win. People said it couldn’t be done."

  • "Now, we finally have everybody into least privileged and auditing through PSM, which has been fantastic."

  • "With conventional local administrative access, you have no insight into how users are using that access. With Endpoint Privilege Manager, we have the ability to see how they’re using that and then lock down things that aren’t appropriate or are not allowed in our company."

  • “We’ve noted a significant reduction in service desk calls, and that has freed up our IT team to focus on rolling out additional apps that further help get the job done faster and more efficiently. Most importantly, Idaptive really enabled us to move our base applications to the cloud. We found the product easy to use, intuitive, and easy to install."

  • “We needed an MDM solution to ensure that we could enforce passwords on devices, that mobile communication would be encrypted, and that we could eliminate proprietary SBA Communications email from any mobile device at a moment’s notice. We needed to accomplish all that without damaging the device or deleting personal information. And last, we needed control and reporting on all mobile devices connecting to our servers. Because those capabilities are inherent to Idaptive, we realized we wouldn’t even need a separate MDM solution.”

  • “We provisioned a couple of additional internal apps and then rolled it out to the rest of the organization by letting Idaptive claim federation for the additional domains. It took about two hours for the changes to be replicated throughout the organization and we began seeing users register through the Idaptive dashboard without any issues.”

  • “Our remote users are leveraging CyberArk Identity Adaptive Multi-Factor Authentication to gain access. It has simplified the process for them, made us more secure and also helped us to maintain compliance with GLBA regulations.”

  • “We were already using a mobile device management product prior to Idaptive, but it made sense to consolidate all identity management in one place, especially since it would alleviate further pressure from IT with one less product to manage, and save on the costs of a separate security solution.”

  • "The fact that your single sign-on provider can also be your mobile device management provider and your multi-factor authentication provider is definitely a positive. In modern IT, you have to cover a lot of bases with a lot of overlap, and dealing with one vendor rather than two or three is optimal."

  • "Idaptive eased the transition to Office 365 significantly. It was a matter of minutes and we were federated. It's incredibly easy to deploy an app and make it available to users. I can't say enough about how valuable it's been for us."