
What is CyberArk Access Manager?
When everything is transforming digitally 鈥 from your industry to the threats you face 鈥 you need identity Access Management (IAM) solutions designed to outpace any security risks that challenge your ability to compete.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCyberArk Access Manager Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on CyberArk Access Manager.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
86 Likeliness to Recommend
1
Since last award
100 Plan to Renew
72 Satisfaction of Cost Relative to Value
1
Since last award
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+88 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love CyberArk Access Manager?
Pros
- Efficient Service
- Includes Product Enhancements
- Reliable
- Saves Time
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Reporting
Multi-Factor Authentication (MFA)
Identity Governance
Password Management
Activity Monitoring Alerts
Privileged Access Management
Advanced Provisioning
Access Request Management
Provisioning Deprovisioning
Mobility Support
Web Cloud Single Sign on (SSO)
Vendor Capability Ratings
Ease of Implementation
Ease of IT Administration
Vendor Support
Breadth of Features
Ease of Data Integration
Quality of Features
Availability and Quality of Training
Ease of Customization
Business Value Created
Usability and Intuitiveness
Product Strategy and Rate of Improvement
CyberArk Access Manager Reviews

SHAHRUKH K.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Development, Integration, and Administration
Submitted Jan 2023
Feature of the asset
Likeliness to Recommend
What differentiates CyberArk Access Manager from other similar products?
yberArk Application Identity Manager is a privileged access management (PAM) solution that is specifically designed to protect and manage application credentials and secrets. Some of the key features and capabilities that differentiate CyberArk Application Identity Manager from other similar products include: CyberArk Application Identity Manager allows organizations to discover, secure, rotate and control access to privileged credentials used by applications and services.
What is your favorite aspect of this product?
Easy to use and very useful
What do you dislike most about this product?
As a language model, I do not have personal preferences or experiences with specific software. However, CyberArk Application Identity Manager (AIM) like any other software, it may have some limitations or drawbacks that some users might not find Complexity in the implementation and management of the solution. High costs associated with the implementation and maintenance of the solution. Limited scalability and the need for additional resources to manage the solution. Lack of integration with other third-party tools. Limited support fo
What recommendations would you give to someone considering this product?
recommendations to keep in mind: Clearly define your requirements and use cases: Understand the specific challenges that you are facing and how CyberArk AIM can address them. Assess your current environment: It is important to understand the current state of your IT infrastructure and how CyberArk AIM will integrate with it. Evaluate the costs: Assess the total cost of ownership, including the costs of the software, hardware, and any additional resources required to implement and maintain the solution.
Pros
- Efficient Service
- Saves Time
- Performance Enhancing
- Unique Features
Cons
- Less Transparent
- Vendor's Interest First
- Vendor Friendly Policies

Dinesh K.
- Role: Consultant
- Industry: Consulting
- Involvement: Business Leader or Manager
Submitted Aug 2022
Provide seamless and secure access
Likeliness to Recommend
What differentiates CyberArk Access Manager from other similar products?
Put Identity Security first without putting productivity second. Leverage the power of CyberArk鈥檚 industry leading Identity Security Platform.
What is your favorite aspect of this product?
Seamless and Secure Access for All Identities
What do you dislike most about this product?
Reporting is not there
What recommendations would you give to someone considering this product?
Go for it,
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing