130 CyberArk Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “The choice of CyberArk Privilege Cloud means that we have a partner that does all of the heavy lifting for us.”

  • “I have deployed CyberArk in companies as small as 150 users, all the way up to Quanta with 16,000 endpoints and numerous individual accounts. In every case, my approach has been identical. And I was again pleased that I did not have to pivot my strategy – the rollout with CyberArk works no matter the size of the company.”

  • "CyberArk is a critical part of our defense and in-depth strategy because it enables us to lock down, control, monitor, and audit our keys to the kingdom."

  • “For employees worldwide, the access to applications — without being aware of the authentication — has greatly improved productivity and utilization of those applications.”

  • “We liked how easy it was to manage secrets on Red Hat OpenShift using CyberArk’s secrets management platform.”

  • "Getting all those servers in, the accounts in place, by the deadline — even just installing it — was all an immediate win. People said it couldn’t be done."

  • "Now, we finally have everybody into least privileged and auditing through PSM, which has been fantastic."

  • "With conventional local administrative access, you have no insight into how users are using that access. With Endpoint Privilege Manager, we have the ability to see how they’re using that and then lock down things that aren’t appropriate or are not allowed in our company."

  • “We’ve noted a significant reduction in service desk calls, and that has freed up our IT team to focus on rolling out additional apps that further help get the job done faster and more efficiently. Most importantly, Idaptive really enabled us to move our base applications to the cloud. We found the product easy to use, intuitive, and easy to install."

  • “We needed an MDM solution to ensure that we could enforce passwords on devices, that mobile communication would be encrypted, and that we could eliminate proprietary SBA Communications email from any mobile device at a moment’s notice. We needed to accomplish all that without damaging the device or deleting personal information. And last, we needed control and reporting on all mobile devices connecting to our servers. Because those capabilities are inherent to Idaptive, we realized we wouldn’t even need a separate MDM solution.”

  • “We provisioned a couple of additional internal apps and then rolled it out to the rest of the organization by letting Idaptive claim federation for the additional domains. It took about two hours for the changes to be replicated throughout the organization and we began seeing users register through the Idaptive dashboard without any issues.”

  • “Our remote users are leveraging CyberArk Identity Adaptive Multi-Factor Authentication to gain access. It has simplified the process for them, made us more secure and also helped us to maintain compliance with GLBA regulations.”

  • “We were already using a mobile device management product prior to Idaptive, but it made sense to consolidate all identity management in one place, especially since it would alleviate further pressure from IT with one less product to manage, and save on the costs of a separate security solution.”

  • "The fact that your single sign-on provider can also be your mobile device management provider and your multi-factor authentication provider is definitely a positive. In modern IT, you have to cover a lot of bases with a lot of overlap, and dealing with one vendor rather than two or three is optimal."

  • "Idaptive eased the transition to Office 365 significantly. It was a matter of minutes and we were federated. It's incredibly easy to deploy an app and make it available to users. I can't say enough about how valuable it's been for us."