CyberArk Application Identity Manager

CyberArk Enterprise Password Vault is designed to discover, secure, rotate and control access to privileged account passwords used to access systems throughout the enterprise IT environment.

Company Details

Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions. Get Assistance

CyberArk Application Identity Manager Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on CyberArk Application Identity Manager.

84 Likeliness to Recommend

100 Plan to Renew

74 Satisfaction of Cost Relative to Value

Emotional Footprint Overview

+83 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale. How to read this rating

How much do users love CyberArk Application Identity Manager?

11% Negative 86% Positive

Pros

How to read the Emotional Footprint

The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.

While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.

Emotional
Footprint

Negative

Neutral

Positive

Feature Ratings

Average rating of all product features, some of which may not be shown below Average 81

Reporting

Software provides reporting functionality

Multi-Factor Authentication (MFA)

Supports multi-factor device and app authentication.

Identity Governance

Software allows identities and access to be centrally managed through policies.

Privileged Access Management

Software provides visibility into specific user access patterns

Activity Monitoring Alerts

User access patterns can be monitored with rule-based alerts for sensitive data access requests.

Provisioning Deprovisioning

Functionality for providing access rights to new users/removing access rights in an intuitive way.

Access Request Management

Software allows IT to track and manage user access requests.

Password Management

Software provides credential management and retrieval functionality.

Advanced Provisioning

Software provides advanced customization and automation for user access provisioning.

Web Cloud Single Sign on (SSO)

Single sign-on capability extends to web and cloud application instances.

Mobility Support

Software is optimized for mobile usage.

Vendor Capability Ratings

Average rating of all vendor capabilities, some of which may not be shown below Average 75

Ease of Implementation

Successfully implementing new software is necessary to realize its full value and promote end user adoption. This data indicates whether or not the product is easy to implement.

Ease of IT Administration

This data indicates whether IT personnel will be able to resolve issues and perform configurations efficiently and effectively.

Breadth of Features

Users prefer feature rich software that enables them to perform diverse series of tasks. This data expresses user satisfaction with the product's breadth of features.

Vendor Support

The importance of vendor support will vary for each organization depending on internal capabilities, but there will always be issues that only the vendor can resolve.

Availability and Quality of Training

Effective and readily available training enables users to get the most out of the software you've chosen. Use this section to make sure your vendor's training programs and materials measure up.

Quality of Features

Feature quality is just as important as quantity. Use this data to determine if this product will do what you're purchasing it to do, easily, intuitively, reliably, and effectively.

Business Value Created

Software needs to create value for employees, customers, partners, and, ultimately, shareholders. This data expresses user satisfaction - or lack thereof - with the product's business value.

Ease of Data Integration

Use this data to determine whether the product will cause headaches or make data integration easy.

Ease of Customization

Don't get bogged down in a difficult customization; use this data to make sure you can easily achieve the functionality you need for your particular situation.

Usability and Intuitiveness

End user learning curves cost the organization money. Pay attention to your end users' technical ability to determine how important UX is in your purchase.

Product Strategy and Rate of Improvement

Vendors who don't stay on top of emerging needs and trends won't enable you to meet your business goals. Use this data to separate innovators from imposters.

CyberArk Application Identity Manager Reviews

Javeed Akthar S.

Validated Review Verified Reviewer Flag this review Please login or register in order to flag this review.

Submitted Apr 2024

Great Passowrd management good market standerds

Likeliness to Recommend

What differentiates CyberArk Application Identity Manager from other similar products?

Uniques style of password management

What is your favorite aspect of this product?

What do you dislike most about this product?

Cost is bit more expensive

What recommendations would you give to someone considering this product?

Be good at data

Pros

Cons

Please tell us why you think this review should be flagged.

Vaibhav P.

Validated Review Verified Reviewer Flag this review Please login or register in order to flag this review.

Submitted Feb 2024

Strong security, usability could improve.

Likeliness to Recommend

What differentiates CyberArk Application Identity Manager from other similar products?

CyberArk Application Identity Manager stands out with its unique focus on securing application access. It offers granular controls, seamless integration, scalability, and comprehensive auditing. This tailored approach ensures robust privileged access management for applications, making it a standout solution in the market.

What is your favorite aspect of this product?

My favorite aspect of CyberArk Application Identity Manager is its granular access controls tailored specifically for applications. This feature ensures that organizations can enforce least privilege policies effectively, reducing the risk of unauthorized access and potential security breaches. By providing such fine-grained control over application access, CyberArk Application Identity Manager helps organizations enhance their overall security posture and mitigate the risk of cyber threats.

What do you dislike most about this product?

One aspect of CyberArk Application Identity Manager that I find challenging is its learning curve. The initial setup and configuration process can be complex, requiring a good understanding of the product's capabilities and how it integrates with existing systems. Additionally, some users may find the interface somewhat overwhelming at first, which could hinder adoption and usability, especially for less experienced users. However, with proper training and support, these challenges can be overcome, allowing organizations to fully leverage the security benefits offered by CyberArk Application Identity Manager.

What recommendations would you give to someone considering this product?

When considering CyberArk Application Identity Manager, it's crucial to thoroughly assess your organization's needs for privileged access management (PAM) in the context of applications. Plan your implementation carefully, including integration with existing systems and user training. Starting with a pilot deployment can help evaluate its performance before full-scale implementation. Take advantage of training resources and support from CyberArk to address any challenges effectively. Stay informed about updates to maximize the benefits of the product and ensure ongoing security.

Pros