Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

CyberArk

Show rating breakdown
219 reviews
  • 7 profiles
  • 24 categories
Average star rating
4.5
Serving customers since
1999
Profile Filters

All Products & Services

Product Avatar Image
CyberArk Workforce Identity

127 reviews

Today’s new reality requires a new kind of access platform. Built on Zero Trust, CyberArk Identity is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.

Product Avatar Image
CyberArk Privileged Access Manager

68 reviews

Enterprise-class, unified policy-based solution that secures, manages and logs all privileged accounts.

Product Avatar Image
CyberArk Conjur

17 reviews

For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

Product Avatar Image
CyberArk Secure Cloud Access

5 reviews

CyberArk Secure Cloud Access provisions just-in-time privileged access for admin operations in multi- cloud environments using the principle of least-privileged access. This improves security posture by removing unnecessary standing access. CyberArk cloud security helps organizations achieve risk reduction, audit and compliance outcomes, while enabling developers to remain secure as they deliver software better and faster in the cloud.

Product Avatar Image
Cyberark Endpoint Privilege Manager

2 reviews

CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface without halting productivity. The solution helps organizations revoke everyday local administrator privileges from business users while elevating privileges when required by trusted applications. CyberArk Endpoint Privilege Manager also enables security teams to enforce granular least privilege policies for IT administrators, helping organizations effectively segregate duties on Windows servers. Complementing these privilege controls, the solution also delivers application controls, which are designed to manage and control which applications are permitted to run on endpoints and servers and prevent malicious applications from penetrating the environment.

Product Avatar Image
CyberArk Workforce Password Management

0 reviews

CyberArk Workforce Password Management is an enterprise-grade solution designed to securely store, manage, and share business application credentials. It addresses the security risks associated with compromised credentials and simplifies password management for employees and IT teams. By integrating with CyberArk's Identity Security Platform, it offers a holistic approach to securing workforce access, ensuring that sensitive information is protected while providing users with seamless, one-click access to their applications. Key Features and Functionality: - Secure Credential Storage: Safely stores and manages credentials, protecting sensitive resources from pre- and post-authentication attacks. Credentials can be stored securely on-premises or in the cloud. - Strong Password Policies: Enforces robust password policies and generates passwords compliant with NIST standards, reducing vulnerabilities from poor password hygiene. Alerts organizations and users when passwords have been involved in a breach or found on the dark web. - Integration with Identity Security Stack: Natively integrates with Single Sign-On , Multi-Factor Authentication , privileged access management, secure enterprise browsing, and web session security, delivering a comprehensive security solution for workforce access. - Collaboration and Sharing: Provides customizable controls for admins and users over sharing credentials with colleagues or transferring ownership of accounts. - Enterprise-Level Insights: Offers detailed reporting on weak or aged passwords and other risky behaviors, helping organizations understand their risk posture and take data-driven approaches to address issues. - Secure Storage Beyond Passwords: Allows users to secure text-based notes, such as license keys, PINs, serial numbers, or sensitive data related to applications, without caching them on the endpoint. Primary Value and Problem Solved: CyberArk Workforce Password Management mitigates the risks associated with compromised credentials by providing a secure, centralized platform for managing and sharing business application passwords. It enhances security by enforcing strong password policies and integrating with existing identity security infrastructures. The solution also improves user productivity by offering effortless logins and instant access to applications, reducing password fatigue and IT inefficiencies. By delivering more than just a password manager, it ensures comprehensive protection of sensitive information across the entire user journey.

Product Avatar Image
CyberArk Software EMEA

0 reviews

CyberArk Software EMEA offers a comprehensive Identity Security Platform designed to secure all identities—human and machine—across various environments, including on-premises, cloud, and hybrid infrastructures. By implementing intelligent privilege controls, CyberArk ensures that organizations can protect their most critical assets from unauthorized access and potential cyber threats. Key Features and Functionality: - Privileged Access Management : CyberArk's flagship offering provides a secure digital vault for storing and managing privileged credentials, coupled with robust session recording capabilities for real-time monitoring and auditing. - Multi-Factor Authentication : Enhances security by requiring multiple forms of authentication, reducing the risk of unauthorized access even if passwords are compromised. - Secrets Management: Secures non-human credentials, such as API keys and SSH keys, by providing a centralized platform for managing these secrets, thereby reducing the risk of exposure. - Single Sign-On : Offers a unified access point for users to access multiple applications without multiple logins, enhancing user experience and security. - Endpoint Privilege Security: Implements least privilege policies on endpoints, reducing the risk of malware and ransomware attacks by restricting elevated privileges on local machines. Primary Value and Problem Solved: CyberArk addresses the critical challenge of securing privileged access within organizations. By implementing robust identity security measures, it mitigates the risk of unauthorized access, data breaches, and insider threats. This comprehensive approach ensures that only authorized identities have access to sensitive systems and data, thereby enhancing overall security posture and compliance with regulatory standards.

Profile Name

Star Rating

148
64
7
1
1

CyberArk Reviews

Review Filters
Profile Name
Star Rating
148
64
7
1
1
DN
Deepak N.
12/02/2025
Validated Reviewer
Review source: Organic

Seamless Password Management with Room for Web password management

I greatly appreciate CyberArk Privileged Access Manager's robust integration capabilities with multiple operating systems and databases, which significantly streamlines our operational workflow. Its ease of access and user-friendly graphical user interface make navigating the platform straightforward, thereby enhancing user experience and reducing the learning curve. The secure storage of every password in the vault offers enhanced security, eliminating the need for me to manually save passwords on my system, and removing the burden of having to remember multiple passwords. Additionally, the straightforward and smooth deployment process of CyberArk Privileged Access Manager was impressive, making the initial setup less daunting.
NB
Nitesh B.
11/14/2025
Validated Reviewer
Verified Current User
Review source: Organic

Enhanced Security and Effortless Collaboration

This tool provides greater security and allows you to think freely without worrying about your passwords, since the vault keeps them protected. What I appreciate most is that you can also share access with your teammates, making collaboration much easier.
Kingshuk S.
KS
Kingshuk S.
Founder CyberSecurityShop | CISM | Cyber Security Specialist | Architect | Cyber Security Practitioner | Cyber Security Blogger
08/08/2025
Validated Reviewer
Review source: G2 invite
Incentivized Review

Privilege Access Managed Environment Vulnerabilities

Integration with tools One of the best tools for PAM and functionality it has to integrate with multiple critical platforms gives us one of key controls

About

Contact

Phone:
1-888-808-9005
HQ Location:
Newton, MA

Social

@CyberArk

What is CyberArk?

CyberArk is a global leader in privileged access management, offering cutting-edge solutions to protect against cyber threats that target privileged accounts, applications, and sensitive data. Positioned as an indispensable security partner, CyberArk provides various products and services specifically designed to secure privileged access across on-premises, cloud, and hybrid environments. Their innovative software helps organizations prevent data breaches by locking down access to their most critical systems and information.CyberArk's comprehensive platform addresses a wide spectrum of security needs, from enforcing least privilege and controlling applications to detecting and responding to threats in real-time. They serve a broad range of industries, including banking, healthcare, retail, energy, and government, empowering businesses to protect their most valuable assets and meet compliance requirements.

Details

Year Founded
1999
Ownership
NASDAQ:CYBR