147 CyberArk Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “Endpoints and workstations are the gateway to everything we do. It’s how we access business applications, DevOps environments, code, customer data, and our infrastructure. Managing privilege across endpoints is foundational.”

  • “CyberArk acts as the first guard against malware or malicious codes on our endpoints."

  • “While there is an increase in security threats, there also is a shortage of experts with in-depth security knowledge and it can be challenging for each of the group’s member companies to staff a dedicated engineer with the appropriate level of experience. Also, when each member company implements its own …

  • "Idaptive eased the transition to Office 365 significantly. It was a matter of minutes and we were federated. It's incredibly easy to deploy an app and make it available to users. I can't say enough about how valuable it's been for us."

  • "When I recommend a service provider to my clients, I want to be certain that once we’re up and running, the client will be fully supported by the vendor. Our experience with Idaptive has assured me of that."

  • "We knew this wouldn't be a typical corporate single sign-on implementation. We were going to try to manage old, outdated legacy apps with a very modern web-based solution. We expected a generation gap, but we've been very pleasantly surprised at the ease with which Idaptive has crossed that gap to …

  • “And it’s not just visibility that the Idaptive audit feature provides — it’s valuable information that can be leveraged to make informed decisions about the server environment. Now, we can perform our own investigation to see exactly what transpired when something goes wrong. We can then take the actions necessary …

  • "With RPA and Cloud migrations, credentials are becoming more and more spread out away from 'normal' controls. CyberArk can spread out to cover all of the scenarios in a standard way."

  • “I have deployed CyberArk in companies as small as 150 users, all the way up to Quanta with 16,000 endpoints and numerous individual accounts. In every case, my approach has been identical. And I was again pleased that I did not have to pivot my strategy – the rollout with …

  • “One measure of the effectiveness of CyberArk is that we now know how every privileged account is being used and there has been a dramatic drop in the opportunity for someone to inflict damage to our environment.”

  • “I was really impressed by the speed of deployment and how quickly CyberArk was able to deliver.”

  • “CyberArk gives us the ability to execute much more rapidly. Implementing CyberArk has removed a lot of the overhead from our team and is letting us execute on the business-critical commitments we’ve made to our stakeholders.”

  • “We also liked the threat analytics capabilities included in the CyberArk platform. The other products we were considering had jump servers and some level of secret storage, but nothing compared to CyberArk’s ability to evaluate commands as they’re executed and detect in real-time when an attack may be underway.”

  • “It was stunning: We compared the number of applications and secrets that CyberArk Conjur could concurrently manage against competing solutions, and the difference in cost was utterly compelling.”

  • “We fell in love with the solution. Not only did it solve the issues we were facing around local administrator privileges, but it also had the granular controls hat empower users to make administrative actions with the necessary guardrails to keep everything safe. This is exciting.”