"With our previous propriety system, meeting audit requirements was an arduous process. Without CyberArk, it would have taken 10 times as much effort to justify. CyberArk has been instrumental in CDW maintaining and sustaining compliance."
"We needed to critically address three security requirements from a global perspective: least privilege, patch management and application control; CyberArk covers two of these for us very nicely having CyberArk Endpoint Privilege Manager takes away most of the guesswork for the ‘can I install, should I install this, is this ok’ kind of questions and it allows us to have a more secure environment."
“The implementation and time to value with both CyberArk and its partner was seamless and quick to succeed. Along the journey, CyberArk advice and support have been great, particularly because CyberArk has such a good understanding of, and experience with, the banking sector and the challenges we face.”
"We knew this wouldn't be a typical corporate single sign-on implementation. We were going to try to manage old, outdated legacy apps with a very modern web-based solution. We expected a generation gap, but we've been very pleasantly surprised at the ease with which Idaptive has crossed that gap to deliver an SSO solution across every app and site we needed it to."
“And it’s not just visibility that the Idaptive audit feature provides — it’s valuable information that can be leveraged to make informed decisions about the server environment. Now, we can perform our own investigation to see exactly what transpired when something goes wrong. We can then take the actions necessary to reverse or correct the situation.”
"With RPA and Cloud migrations, credentials are becoming more and more spread out away from 'normal' controls. CyberArk can spread out to cover all of the scenarios in a standard way."
“I have deployed CyberArk in companies as small as 150 users, all the way up to Quanta with 16,000 endpoints and numerous individual accounts. In every case, my approach has been identical. And I was again pleased that I did not have to pivot my strategy – the rollout with CyberArk works no matter the size of the company.”
“One measure of the effectiveness of CyberArk is that we now know how every privileged account is being used and there has been a dramatic drop in the opportunity for someone to inflict damage to our environment.”
“I was really impressed by the speed of deployment and how quickly CyberArk was able to deliver.”
“CyberArk gives us the ability to execute much more rapidly. Implementing CyberArk has removed a lot of the overhead from our team and is letting us execute on the business-critical commitments we’ve made to our stakeholders.”
“We also liked the threat analytics capabilities included in the CyberArk platform. The other products we were considering had jump servers and some level of secret storage, but nothing compared to CyberArk’s ability to evaluate commands as they’re executed and detect in real-time when an attack may be underway.”
“It was stunning: We compared the number of applications and secrets that CyberArk Conjur could concurrently manage against competing solutions, and the difference in cost was utterly compelling.”
“We fell in love with the solution. Not only did it solve the issues we were facing around local administrator privileges, but it also had the granular controls hat empower users to make administrative actions with the necessary guardrails to keep everything safe. This is exciting.”
“Being able to assure senior management that we can engage the appropriate controls as needed, and remain compliant throughout the process, is really a big win for us.”
“We were in our deepest, darkest hour of need and that’s when you turn to what you know and trust. For me, this was CyberArk.”