360 Score: 2.68
For Vendors
  • Massachusetts, USA
  • $101MN to $500MN



CyberArk’s growth strategy includes global expansion by leveraging systems integrators and distribution partnerships. They look forward to enhance their product offerings and marketing strategy by establishing technology alliances with security vendors. CyberArk’s acquisition of Viewfinity, Inc. In terms of organic growth strategy, CyberArk continuously works on enriching its product portfolio by integrating it with partner solutions and releasing new versions of the existing products with enhanced features. For instance, CyberArk integrated Viewfinity with new capabilities that deliver privileged account security to the endpoint. This will help their customers gain greater privilege management and application control capabilities.


CyberArk is one of the leading security companies whose prime focus is on privilege account security. CyberArk acquired Viewfinity in October, 2015, a provider of application control solution. This acquisition extended CyberArk’s offerings to privileges account security and application control, to limit the progression of malware-based attacks on endpoints. Apart from delivering a new category of targeted security solutions and preventing attack escalation, the company is also mastering in high stake compliances and audit requirements. CyberArk has its business presence in regions such as the U.S., Israel, the U.K., France, Germany, the Netherlands, and Singapore and serves customers in more than 65 countries. With its offices and partners located across the world, CyberArk caters to a wide range of industries such as healthcare, energy & utility, education, telecom, government, finance, and others.

Popular Comparisons

Evaluated against 168 key buying criteria
  • Advanced Persistent Threat (APT) Protection
  • Application Detection and Usage Control
  • Application Reputation Scoring
  • Policy Management
  • Desktop/Laptop
  • Mobile/Tablet
  • Servers
  • Delivery - Directly
  • Remote Support
  • Whitelisting
  • Hosted / On-Cloud
  • On-Premise
  • Blacklisting
  • Threat Detection
  • Customer redressal mechanism
  • Delivery - Through Partners / Third-Party Vendors
  • End-users/Work stations
  • Levels of support
  • Product Demos
  • Products/Solutions offered
  • Point of Sale (PoS) Systems
  • Removable Devices
  • Virtual Machines
  • On-Site Support
  • Advanced Memory Protection
  • Compliance Management
  • Visibility and Reporting
  • Dedicated Account Manager (DAM)
  • Backup and Recovery
  • Identity Management
  • Patch Management
  • Security Support
  • Threat Intelligence
  • Application Development Team
  • Compliance & Risk Management
  • Managed Security Services
  • Vulnerability Assessment
  • Linux OS
  • Mac OS
  • Windows 10
See More
No Reviews

Questions And Answers

Have a Question? Ask here.
No Questions
No Photos / Videos

Top CYBERARK Features

#1 Product Features and Functionality / Application Control features
#2 Product Features and Functionality / Type of access points
#3 Scalability / System configuration required
#4 Scalability / End-users/Work stations
#5 Support and Services / Customer redressal mechanism


CYBERARK has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

  • Niche Quadrant


  • Niche Quadrant