130 CyberArk Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “I was really impressed by the speed of deployment and how quickly CyberArk was able to deliver.”

  • “We decided to secure privileged identities and their remote access with a single platform because of the cost of multiple solutions and deployment complexity, it made more sense to consolidate and find synergies from a single vendor.”

  • “With CyberArk Identity, we have a 100% cloud- based identity solution that provides authentication, provisioning and deprovisioning, MDM, Mac management, and the ability to track which users are logging into which apps and services.”

  • "Idaptive eased the transition to Office 365 significantly. It was a matter of minutes and we were federated. It's incredibly easy to deploy an app and make it available to users. I can't say enough about how valuable it's been for us."

  • "When I recommend a service provider to my clients, I want to be certain that once we’re up and running, the client will be fully supported by the vendor. Our experience with Idaptive has assured me of that."

  • "We knew this wouldn't be a typical corporate single sign-on implementation. We were going to try to manage old, outdated legacy apps with a very modern web-based solution. We expected a generation gap, but we've been very pleasantly surprised at the ease with which Idaptive has crossed that gap to deliver an SSO solution across every app and site we needed it to."

  • “And it’s not just visibility that the Idaptive audit feature provides — it’s valuable information that can be leveraged to make informed decisions about the server environment. Now, we can perform our own investigation to see exactly what transpired when something goes wrong. We can then take the actions necessary to reverse or correct the situation.”

  • "With RPA and Cloud migrations, credentials are becoming more and more spread out away from 'normal' controls. CyberArk can spread out to cover all of the scenarios in a standard way."

  • “I have deployed CyberArk in companies as small as 150 users, all the way up to Quanta with 16,000 endpoints and numerous individual accounts. In every case, my approach has been identical. And I was again pleased that I did not have to pivot my strategy – the rollout with CyberArk works no matter the size of the company.”

  • “One measure of the effectiveness of CyberArk is that we now know how every privileged account is being used and there has been a dramatic drop in the opportunity for someone to inflict damage to our environment.”

  • “CyberArk gives us the ability to execute much more rapidly. Implementing CyberArk has removed a lot of the overhead from our team and is letting us execute on the business-critical commitments we’ve made to our stakeholders.”

  • “We also liked the threat analytics capabilities included in the CyberArk platform. The other products we were considering had jump servers and some level of secret storage, but nothing compared to CyberArk’s ability to evaluate commands as they’re executed and detect in real-time when an attack may be underway.”

  • “It was stunning: We compared the number of applications and secrets that CyberArk Conjur could concurrently manage against competing solutions, and the difference in cost was utterly compelling.”

  • “We fell in love with the solution. Not only did it solve the issues we were facing around local administrator privileges, but it also had the granular controls hat empower users to make administrative actions with the necessary guardrails to keep everything safe. This is exciting.”

  • “Being able to assure senior management that we can engage the appropriate controls as needed, and remain compliant throughout the process, is really a big win for us.”