TrustRadius: an HG Insights company

Cyberark Secrets Manager

Score6.8 out of 10

4 Reviews and Ratings

What is Cyberark Secrets Manager?

Cyberark Secrets Manager (formerly Conjur) is used to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via a secrets management software solution.

Media

CyberArk Conjur UI
CyberArk Conjur UI
CyberArk Conjur UI

1 / 3

Best Deal!

Use Cases and Deployment Scope

The Cyberark Conjur tool helped my organization to secure and manage secrets such as passwords, keys, and certificates. It acts as a central repository for storing and managing sensitive information, as well as tools for controlling access to those secrets based on role-based access control.

Pros

  • Secret Management : Allows organizations to securely store, manage and rotate sensitive data and secrets, such as passwords and API keys

Cons

  • Mobile Support : Cyberark Conjur doesn't have mobile app and it is not optimised for those devices.

Most Important Features

  • Multi Cloud Support : Conjur Support for multiple cloud environments is important, as it allows users to protect their sensitive data and systems regardless of where they are hosted

Return on Investment

  • Conjur has the potential to have a positive impact on a business's overall security objectives by providing roubust secure control, secrets management, and compliance capabilities. This helped to prevent from data breaches, ensured compliance with industry regulations, and improved overall security posture

Cyberark Conjur for the win!

Use Cases and Deployment Scope

Cyberark Conjur is widely used in my organization for various authentication purposes. This could be for apps, password storage, scripts, containers, or databases giving quick access to the information we need. We also use Cyberark Conjur to verify and authenticate outside vendors giving them access to our network and highly private information. Only when they can answer several predetermined questions provided from Cyberark Conjur will a password be generated and access can be granted.

Pros

  • Provide allow-list
  • verifying authority
  • validate access

Cons

  • Searching containers can be difficult if you're not sure which you're looking for.
  • Initial authorization can be slow, specifically if the first instance failed.

Most Important Features

  • Links within containers
  • quick authentication
  • One stop shop

Return on Investment

  • Before Cyberark we put passwords in a spread sheet - leaving exposure to theft.
  • Gives security compliance to our company
  • Keeps company and teams secure and safe.

Alternatives Considered

BeyondTrust Endpoint Privilege Management and AWS Identity & Access Management

Other Software Used

BeyondTrust Endpoint Privilege Management