147 CyberArk Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “The greater value is that our cybersecurity posture has matured as a result of CyberArk. We have been able to create more efficient identity security and management processes.”

  • “Right from the outset, it was apparent that CyberArk IGA was designed for companies that rely heavily on cloud-based tools. Our integration was so quick. Everyone was onboarded immediately, and we saw results in our first fiscal quarter of use.”

  • “It was stunning: We compared the number of applications and secrets that CyberArk Conjur could concurrently manage against competing solutions, and the difference in cost was utterly compelling.”

  • “We built roles based on business rules, departments or divisions in Workday, and then used inbound provisioning from Workday to Active Directory with the former serving as the ‘source of truth’ for all users. Today, everything that happens downstream is automated and driven by the business rules surrounding a Workday …

  • “For employees worldwide, the access to applications — without being aware of the authentication — has greatly improved productivity and utilization of those applications.”

  • “We liked how easy it was to manage secrets on Red Hat OpenShift using CyberArk’s secrets management platform.”

  • "Getting all those servers in, the accounts in place, by the deadline — even just installing it — was all an immediate win. People said it couldn’t be done."

  • "Now, we finally have everybody into least privileged and auditing through PSM, which has been fantastic."

  • "With conventional local administrative access, you have no insight into how users are using that access. With Endpoint Privilege Manager, we have the ability to see how they’re using that and then lock down things that aren’t appropriate or are not allowed in our company."

  • “We’ve noted a significant reduction in service desk calls, and that has freed up our IT team to focus on rolling out additional apps that further help get the job done faster and more efficiently. Most importantly, Idaptive really enabled us to move our base applications to the cloud. We …

  • “We needed an MDM solution to ensure that we could enforce passwords on devices, that mobile communication would be encrypted, and that we could eliminate proprietary SBA Communications email from any mobile device at a moment’s notice. We needed to accomplish all that without damaging the device or deleting personal …

  • “We provisioned a couple of additional internal apps and then rolled it out to the rest of the organization by letting Idaptive claim federation for the additional domains. It took about two hours for the changes to be replicated throughout the organization and we began seeing users register through the …

  • “Our remote users are leveraging CyberArk Identity Adaptive Multi-Factor Authentication to gain access. It has simplified the process for them, made us more secure and also helped us to maintain compliance with GLBA regulations.”

  • “We were already using a mobile device management product prior to Idaptive, but it made sense to consolidate all identity management in one place, especially since it would alleviate further pressure from IT with one less product to manage, and save on the costs of a separate security solution.”

  • "The fact that your single sign-on provider can also be your mobile device management provider and your multi-factor authentication provider is definitely a positive. In modern IT, you have to cover a lot of bases with a lot of overlap, and dealing with one vendor rather than two or three …