Welcome!

News Feed Item

 CyberArk Eliminates Security Gaps Across Public, Private, Hybrid Cloud and SaaS Environments

CyberArk, the company securing the heart of the enterprise, today announced it has extended the CyberArk Privileged Account Security Solution to all major public, private, hybrid cloud and software as a service (SaaS) environments. By integrating with leading business, social media, IT and operational cloud solutions, CyberArk empowers customers to discover, monitor and secure privileged accounts across the entire IT infrastructure, protecting the primary pathway of all advanced attacks.

While privileged accounts have been implicated in 100 percent of advanced cyber-attack breaches1, they largely go unprotected across cloud environments, due to immature defense strategies around this critical security layer. Hackers target these accounts because they provide the ‘keys to controlling the infrastructure,’ – whether that is through the cloud, on-premises, or across industrial control systems. The scalable, fluid infrastructure inherent in cloud environments results in unique differences in how privileged accounts behave.

Plugging this critical security gap, CyberArk’s new cloud capabilities enable full monitoring and control over all privileged and administrative credentials that are uniquely required to manage cloud environments and hosted images. CyberArk is the only provider with a full solution-set, including behavioral analytics, covering the entire spectrum of privilege, including out of the box integrations with SaaS applications, hypervisor management solutions, as well as supporting major cloud platforms such as Amazon Web Services (AWS) and Microsoft Azure.

“The cloud is fundamentally changing the nature of privileged account security. Server instances can be created instantaneously across multiple cloud environments, SaaS applications serve more critical functions, while infrastructure and privileged accounts are maintained in part by third-party vendors,” said Roy Adar, vice president, product management, CyberArk. “Migrating to the cloud introduces complexity for enterprises to navigate, which is why CyberArk has gone to great lengths to create a single, streamlined approach to manage privilege from the datacenter out to any cloud environment. No matter what environment an organizations uses, CyberArk has you covered.”

Defending Against Advanced Threats in the Cloud

By extending its Privileged Account Security Solution to the cloud, CyberArk enables customers to use the same platform protecting on-premises and industrial control systems to cover their cloud environments, including:

  • Public Clouds: CyberArk integrates with all cloud providers and leading service providers like AWS and Azure empowering customers to:
    • Use the same infrastructure to secure privileged access to on-site servers, databases, desktops, network device and remotely managed machines
    • Prevent guest machines from exposing default password vulnerabilities
    • Eliminate hard coded and visible credentials from applications and scripts that use cloud providers’ API
    • Establish single-sign-on to privileged accounts in the cloud
    • Protect cloud-based servers from unauthorized access by third-party cloud service providers and malicious attackers
    • Monitor all privileged user activity and alert on suspicious behavior in public cloud environments
  • Private Clouds: Integrations with VMware vCenter, and Microsoft HyperV provide:
    • Improved security protection of management system credentials, including password rotation
    • Automatic replacement of default passwords for newly provisioned systems and guest machines
    • Monitoring, recording and alerting on all administrative user sessions for faster and more thorough compliance auditing
  • SaaS Environments: Applications provided as a service face a myriad of challenges with shared passwords. CyberArk provides integrations with leading SaaS applications, including Salesforce.com, Office365, Windows Intune, Facebook, Twitter, LinkedIn and Microsoft Dynamics CRM to:
    • Automate and enforce best practice privileged account security, including enforcing one-time passwords
    • Provide individual accountability fully monitoring activity on shared accounts
    • Secure social media accounts from advanced attacks and privileged exploitation
    • Provide single-sign-on to SaaS application accounts
    • Extend privileged accounts security solution to all SaaS applications with the CyberArk universal connector

Additionally, to combat the significant increase in users accessing key accounts across cloud environments, CyberArk Privileged Threat Analytics analyzes all user behavior and detects activates anomalous to typical behavior. Behavior is analyzed in real-time, creating alerts for unusual activity, for example a user accessing a credential at an unusual time of day.

For more information on CyberArk’s privileged account cloud security solutions, please visit www.cyberark.com.

About CyberArk

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 30 of the Fortune 100 and 17 of the world’s top 20 banks – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA. The company also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.

1 2013 CyberSheath Report, APT Privileged Account Exploitation

Copyright © 2014 Cyber-Ark Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
"NetApp is known as a data management leader but we do a lot more than just data management on-prem with the data centers of our customers. We're also big in the hybrid cloud," explained Wes Talbert, Principal Architect at NetApp, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We're focused on how to get some of the attributes that you would expect from an Amazon, Azure, Google, and doing that on-prem. We believe today that you can actually get those types of things done with certain architectures available in the market today," explained Steve Conner, VP of Sales at Cloudistics, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
It is of utmost importance for the future success of WebRTC to ensure that interoperability is operational between web browsers and any WebRTC-compliant client. To be guaranteed as operational and effective, interoperability must be tested extensively by establishing WebRTC data and media connections between different web browsers running on different devices and operating systems. In his session at WebRTC Summit at @ThingsExpo, Dr. Alex Gouaillard, CEO and Founder of CoSMo Software, presented ...
Enterprises are adopting Kubernetes to accelerate the development and the delivery of cloud-native applications. However, sharing a Kubernetes cluster between members of the same team can be challenging. And, sharing clusters across multiple teams is even harder. Kubernetes offers several constructs to help implement segmentation and isolation. However, these primitives can be complex to understand and apply. As a result, it’s becoming common for enterprises to end up with several clusters. Thi...
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, introduced two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a multip...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
High-velocity engineering teams are applying not only continuous delivery processes, but also lessons in experimentation from established leaders like Amazon, Netflix, and Facebook. These companies have made experimentation a foundation for their release processes, allowing them to try out major feature releases and redesigns within smaller groups before making them broadly available. In his session at 21st Cloud Expo, Brian Lucas, Senior Staff Engineer at Optimizely, discussed how by using ne...
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, provided a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to oper...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...