130 CyberArk Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “Prior to implementing CyberArk, if there was a compromise, we had no efficient way of uncovering what occurred or knowing what needed to be done to remediate the situation.”

  • “We liked how easy it was to manage secrets on Red Hat OpenShift using CyberArk’s secrets management platform.”

  • “The CyberArk deployment brings us a company-wide sense of reliability and comfort. The adoption process across our platforms, assets, and the way their workforce password management, adaptive multi-factor authentication and single-sign on integrates into business operations – it left the team with a collective feeling of amazement.”

  • “We have had instances of CyberArk stopping ransomware attacks, so there is the cost avoidance where we have detected and stopped malicious software on the endpoint.”

  • “Of course, the information systems department has also been addressing company-wide security and compliance measures. However, the game development department handles vital data assets using a dedicated development environment for each project. Since we sell our content around the world, we also need to consider laws and regulations from the outset to create products that comply with the rules of each country and region. In addition, since we are operating a large-scale system with numerous development projects running concurrently, we add our own approach to support smooth creativity."

  • “The development environment centered on a server is accessed by engineers from individual PC terminals. The server, where all kinds of data are concentrated, is the place that must be protected the most. With a few exceptions, the personnel for each project in charge of servers is not IT professionals but application programmers who also have game development tasks. The development environment is mainly Linux servers, and not everyone is familiar with the operation. Therefore, there was a risk that account management would inevitably become sloppy. Implementing a privileged access management solution was one of our most urgent and important tasks.”

  • “Svensk Travsport chose CyberArk because it met our needs, is easy to customize and can evolve as our business changes. I felt CyberArk’s approach towards securing identities was one of the best solutions I have seen.”

  • “When we process our cybersecurity insurance, applications and renewals, the fact that we have CyberArk and a privileged access management program makes the application easier.”

  • “CyberArk acts as the first guard against malware or malicious codes on our endpoints."

  • “Whatever we need and whenever we need it, CyberArk is on our side.”

  • “Turkcell gets attacked every day because criminals see us as a target, But our job is to show up and defend ourselves, our partners, and our customers. And we feel very confident that we are doing a great job and we are well protected, primarily because of the CyberArk solutions we have in place.”

  • “The greater value is that our cybersecurity posture has matured as a result of CyberArk. We have been able to create more efficient identity security and management processes.”

  • “If we can control identity, we can stop most modern attacks. And if you control identity, then you control every perimeter, application, container – effectively every part of the environment. That is what I call true Zero Trust and that is why we use CyberArk. This is what helps me sleep at night."

  • “If someone asked me how they can best protect their vital business assets, I would tell them to get CyberArk. Here at Banco Galicia, one of the biggest banks in Argentina, we have an indisputable example of success with the product.”

  • “The implementation of CyberArk was very transparent and there was little work to do because of features such as the pre-set-up console."