Quick navigation

CyberArk

CyberArk Privileged Access Security Solution

Secure privileged credentials and secrets wherever they exist: on-premises, in the cloud, and anywhere in between
Value Proposition

Problem

Privileged access is pervasive and provides the “keys to the IT kingdom.” This access can allow complete control of data, infrastructure and assets, across the enterprise, in the cloud and throughout the DevOps pipeline. 

Solution

CyberArk is the market leader and trusted expert in privileged access management. Designed from the ground up for security, the CyberArk Privileged Access Security Solution provides the most comprehensive solution for all systems on-premises and in the cloud, from every endpoint, through the DevOps pipeline. This complete enterprise-ready Privileged Access Security Solution is tamper-resistant, scalable and built for complex distributed environments to provide the utmost protection from advanced external and insider threats. 

Features

  • Credential protection and management
  • Isolate, control, monitor, and record privileged sessions
  • Analytics and alerting on malicious privileged access activity
  • Least privilege access control for *NIX and Windows
  • Domain controller protection
  • Remote vendor access to Core PAS
  • Manage credentials for commercial off-the-shelf solutions with validated integrations
  • Protect internally-developed traditional applications by eliminating hard-coded passwords
  • Secure cloud-native applications built using DevOps methodologies
  • Enforce privilege security on the endpoint
Supporting Technology
  • Encryption Algorithms: AES-256, RSA-2048; HSM integration; FIPS 140-2 validated cryptography
  • High Availability: Clustering support; Multiple Disaster Recovery sites; Integration with enterprise backup system
  • Access and Workflow Management: LDAP directories ; Identity and Access Management ; Ticketing and workflow systems
  • Multi-lingual Portal: English, French, German, Spanish, Russian, Japanese, Chinese (Simplified and traditional), Brazilian Portuguese, Korean
  • Authentication Methods: Username and Password, LDAP, Windows authentication, RSA SecurID, Web SSO, RADIUS, PKI, SAML, smart cards
  • Monitoring: SIEM integration, SNMP traps, Email notifications
Standards & Compliance
  • GDPR
  • ISO27000
  • PCI DSS
  • SOX
Customers

References

CyberArk has not listed customer references

Downloads

Video(s)