CyberArk’s growth strategy includes global expansion by leveraging systems integrators and distribution partnerships. They look forward to enhance their product offerings and marketing strategy by establishing technology alliances with security vendors. CyberArk’s acquisition of Viewfinity, Inc. In terms of organic growth strategy, CyberArk continuously works on enriching its product portfolio by integrating it with partner solutions and releasing new versions of the existing products with enhanced features. For instance, CyberArk integrated Viewfinity with new capabilities that deliver privileged account security to the endpoint. This will help their customers gain greater privilege management and application control capabilities.

USP : CyberArk is one of the leading security companies whose prime focus is on privilege account security. CyberArk acquired Viewfinity in October, 2015, a provider of application control solution. This acquisition extended CyberArk’s offerings to privileges account security and application control, to limit the progression of malware-based attacks on endpoints. Apart from delivering a new category of targeted security solutions and preventing attack escalation, the company is also mastering in high stake compliances and audit requirements. CyberArk has its business presence in regions such as the U.S., Israel, the U.K., France, Germany, the Netherlands, and Singapore and serves customers in more than 65 countries. With its offices and partners located across the world, CyberArk caters to a wide range of industries such as healthcare, energy & utility, education, telecom, government, finance, and others.

BUYERS
VENDORS
EXPERTS
2.7
ANALYSTS
 

CYBERARK detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
Support and Services
2.70
2.00
Scalability
3.80
5.00
Product Features and Functionality
2.45
2.80
Delivery
4.25
4.25
Breadth and Depth of Product Offering
2.15
2.45
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

CYBERARK has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    9 Participants

  • Niche Quadrant

    All-Asia-Pacific

    10 Participants

  • Niche Quadrant

    All-Europe

    10 Participants

STRENGTHS
  • Product Maturity / Application Control features
    Advanced Persistent Threat (APT) Protection
  • Product Maturity / Application Control features
    Application Detection and Usage Control
  • Product Maturity / Application Control features
    Application Reputation Scoring
  • Product Maturity / Application Control features
    Policy Management
  • Product Maturity / Type of access points
    Desktop/Laptop
  • Product Maturity / Type of access points
    Mobile/Tablet
  • Product Maturity / Type of access points
    Servers
  • Product Maturity / Mode of delivery
    Delivery - Directly
  • Product Maturity / Support services
    Remote Support
  • Product Maturity / Application Control techniques
    Whitelisting
  • Product Maturity / Deployment model
    Hosted / On-Cloud
  • Product Maturity / Deployment model
    On-Premise
  • Product Maturity / Application Control techniques
    Blacklisting
  • Product Maturity / Application Control features
    Threat Detection
  • Product Maturity / Support and Services
    Customer redressal mechanism
  • Product Maturity / Mode of delivery
    Delivery - Through Partners / Third-Party Vendors
  • Product Maturity / Scalability
    End-users/Work stations
  • Product Maturity / Support and Services
    Levels of support
  • Product Maturity / Pre-sales support
    Product Demos
  • Product Maturity / Breadth and Depth of Product Offering
    Products/Solutions offered
WEAKNESSES

Have you EVER used CYBERARK Products?

Share your experience with potential buyers.

TOP FEATURES
  • Product Features and Functionality
    Application Control features
  • Product Features and Functionality
    Type of access points
  • Application Control features
    Threat Detection
  • End-users catered
    IT Administrators
  • Type of access points
    Servers
  • OS/Platforms supported
    Windows Server 2003
  • End-users catered
    Information Security Specialists
  • Deployment model / Hosted
    On-Cloud
  • Type of Support services
    Technical Support
  • Pre-sales support
    Proof of Concept

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS