Welcome!

News Feed Item

 CyberArk Eliminates Security Gaps Across Public, Private, Hybrid Cloud and SaaS Environments

CyberArk, the company securing the heart of the enterprise, today announced it has extended the CyberArk Privileged Account Security Solution to all major public, private, hybrid cloud and software as a service (SaaS) environments. By integrating with leading business, social media, IT and operational cloud solutions, CyberArk empowers customers to discover, monitor and secure privileged accounts across the entire IT infrastructure, protecting the primary pathway of all advanced attacks.

While privileged accounts have been implicated in 100 percent of advanced cyber-attack breaches1, they largely go unprotected across cloud environments, due to immature defense strategies around this critical security layer. Hackers target these accounts because they provide the ‘keys to controlling the infrastructure,’ – whether that is through the cloud, on-premises, or across industrial control systems. The scalable, fluid infrastructure inherent in cloud environments results in unique differences in how privileged accounts behave.

Plugging this critical security gap, CyberArk’s new cloud capabilities enable full monitoring and control over all privileged and administrative credentials that are uniquely required to manage cloud environments and hosted images. CyberArk is the only provider with a full solution-set, including behavioral analytics, covering the entire spectrum of privilege, including out of the box integrations with SaaS applications, hypervisor management solutions, as well as supporting major cloud platforms such as Amazon Web Services (AWS) and Microsoft Azure.

“The cloud is fundamentally changing the nature of privileged account security. Server instances can be created instantaneously across multiple cloud environments, SaaS applications serve more critical functions, while infrastructure and privileged accounts are maintained in part by third-party vendors,” said Roy Adar, vice president, product management, CyberArk. “Migrating to the cloud introduces complexity for enterprises to navigate, which is why CyberArk has gone to great lengths to create a single, streamlined approach to manage privilege from the datacenter out to any cloud environment. No matter what environment an organizations uses, CyberArk has you covered.”

Defending Against Advanced Threats in the Cloud

By extending its Privileged Account Security Solution to the cloud, CyberArk enables customers to use the same platform protecting on-premises and industrial control systems to cover their cloud environments, including:

  • Public Clouds: CyberArk integrates with all cloud providers and leading service providers like AWS and Azure empowering customers to:
    • Use the same infrastructure to secure privileged access to on-site servers, databases, desktops, network device and remotely managed machines
    • Prevent guest machines from exposing default password vulnerabilities
    • Eliminate hard coded and visible credentials from applications and scripts that use cloud providers’ API
    • Establish single-sign-on to privileged accounts in the cloud
    • Protect cloud-based servers from unauthorized access by third-party cloud service providers and malicious attackers
    • Monitor all privileged user activity and alert on suspicious behavior in public cloud environments
  • Private Clouds: Integrations with VMware vCenter, and Microsoft HyperV provide:
    • Improved security protection of management system credentials, including password rotation
    • Automatic replacement of default passwords for newly provisioned systems and guest machines
    • Monitoring, recording and alerting on all administrative user sessions for faster and more thorough compliance auditing
  • SaaS Environments: Applications provided as a service face a myriad of challenges with shared passwords. CyberArk provides integrations with leading SaaS applications, including Salesforce.com, Office365, Windows Intune, Facebook, Twitter, LinkedIn and Microsoft Dynamics CRM to:
    • Automate and enforce best practice privileged account security, including enforcing one-time passwords
    • Provide individual accountability fully monitoring activity on shared accounts
    • Secure social media accounts from advanced attacks and privileged exploitation
    • Provide single-sign-on to SaaS application accounts
    • Extend privileged accounts security solution to all SaaS applications with the CyberArk universal connector

Additionally, to combat the significant increase in users accessing key accounts across cloud environments, CyberArk Privileged Threat Analytics analyzes all user behavior and detects activates anomalous to typical behavior. Behavior is analyzed in real-time, creating alerts for unusual activity, for example a user accessing a credential at an unusual time of day.

For more information on CyberArk’s privileged account cloud security solutions, please visit www.cyberark.com.

About CyberArk

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 30 of the Fortune 100 and 17 of the world’s top 20 banks – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA. The company also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.

1 2013 CyberSheath Report, APT Privileged Account Exploitation

Copyright © 2014 Cyber-Ark Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, wil...
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Enterprises have forever faced challenges surrounding the sharing of their intellectual property. Emerging cloud adoption has made it more compelling for enterprises to digitize their content, making them available over a wide variety of devices across the Internet. In his session at 19th Cloud Expo, Santosh Ahuja, Director of Architecture at Impiger Technologies, will introduce various mechanisms provided by cloud service providers today to manage and share digital content in a secure manner....
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
SYS-CON Events announced today Telecom Reseller has been named “Media Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…