SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS



Similar documents
PRIVILEGED IDENTITY MANAGEMENT CASE STUDY. Barak Feldman, Cyber-Ark Software Seth Fogie, Lancaster General Health

GOT PRIVILEGE? - THE PRIVILEGED CHALLENGE Adam Bosnian EVP America s and Corporate Development

SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS. Presenter: Terence Siau

Learn From the Experts: CyberArk Privileged Account Security. Łukasz Kajdan, Sales Manager Baltic Region Veracomp SA

Privileged Session Management Suite: Solution Overview

MANAGEMENT IN THE CLOUD ADAM BOSNIAN

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Privilege Gone Wild: The State of Privileged Account Management in 2015

Privilege Gone Wild: The State of Privileged Account Management in 2015

Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) An Assessment of Cyber-Ark's Solutions

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Privileged - Super Users out of Control

Next Generation Jump Servers for Industrial Control Systems

CyberArk Privileged Threat Analytics. Solution Brief

Securing Remote Vendor Access with Privileged Account Security

Seven Things To Consider When Evaluating Privileged Account Security Solutions

The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect and respond to privileged accounts

HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES

Global Privileged Identity Management Market. technavio insights

IBM Security Privileged Identity Manager helps prevent insider threats

Cloud Services Catalog with Epsilon

How To Manage A Privileged Account Management

Pass-the-Hash. Solution Brief

The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect, alert and respond to privileged accounts

privileged identities management best practices

The 10 Pains of UNIX Security. Learn How Privileged Account Security Solutions are the Right Painkiller

Trust but Verify: Best Practices for Monitoring Privileged Users

RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT

Cyber-Ark Software and the PCI Data Security Standard

ObserveIT User Activity Monitoring

PCI DSS Reporting WHITEPAPER

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Drawbacks to Traditional Approaches When Securing Cloud Environments

integrating cutting-edge security technologies the case for SIEM & PAM

Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP

Securing the Service Desk in the Cloud

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Secret Server Qualys Integration Guide

Guideline on Implementing Cloud Identity and Access Management

Integration Guide. CyberArk Microsoft Windows

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

An Overview of Samsung KNOX Active Directory and Group Policy Features

Dell Software. Jiří Svatuška

Devising a Server Protection Strategy with Trend Micro

Windows Least Privilege Management and Beyond

BeyondInsight Version 5.6 New and Updated Features

Complementing Vaulting Technologies in the Data Center

What should you expect a privileged access management solution to do?

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

PowerBroker for Windows Desktop and Server Use Cases February 2014

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Cloud Security Who do you trust?

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

RSA Event Source Configuration Guide

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Cloud Computing Governance & Security. Security Risks in the Cloud

The Convergence of IT Operations

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

2010 State of Virtualization Security Survey

Kaseya IT Automation Framework

Secure Your Cloud and Outsourced Business with Privileged Identity Management

Identity Access Management Challenges and Best Practices

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Tenable for CyberArk

USER ACTIVITY MONITORING FOR IBM SECURITY PRIVILEGED IDENTITY MANAGER

The 7 Tenets of Successful Identity & Access Management

An Overview of Samsung KNOX Active Directory-based Single Sign-On

Cloud Security: Is It Safe To Go In Yet?

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

Devising a Server Protection Strategy with Trend Micro

Securing Sensitive Data within Amazon Web Services EC2 and EBS

The Benefits of an Integrated Approach to Security in the Cloud

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

Security Information & Event Management (SIEM)

Keeping Tabs on the Top 5 Critical Changes in Active Directory with Netwrix Auditor

OBSERVEIT 6.0 WHAT S NEW

next generation privilege identity management

RSA SecurID Two-factor Authentication

Continuous Network Monitoring

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Identity Management

Key Cyber Risks at the ERP Level

Transcription:

SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS

Cyber-Ark Overview Established in 1999, HQ Boston, US Strategic Partnerships Offices Worldwide Award-winning patented Vaulting Technology 50% CAGR in the last 5 years 200+ new Enterprise customers in 2011 Recognized Market Leadership Enterprise Security Solution of the Year 2010 Winner The company has gradually expanded from its initial start as an enterprise vault for file and sensitive content sharing to assume a commanding position in privileged identity management (PIM) - Steve Copland, April 2010 Cyber-Ark has one of the largest customer bases of the vendors included in this Market Scope and, because of its focus on enterprise customers the largest market share by revenue by a wide margin. - Ant Allan/Perry Carpenter, June 2009 Cyber-Ark is perceived as a leader in the rapidly expanding market for Privileged Access Management solutions. - Martin Kuppinger, 2010 Cyber-ark is at the top of the PIM market, based on product maturity & the number of customer deployments -Mark Diodati, 2009 2

Cyber-Ark s Solution Suites Sensitive Information Management Suite Privileged Identity Management Suite Privileged Session Management Suite Inter-Business Vault Sensitive Document Vault Enterprise Password Vault Application Identity Manager On-Demand Privileges Manager PSM for Servers PSM for Databases PSM for Virtualization 3

Privileged Accounts Give System-Wide Access 48% of data breaches were caused by privileged misuse 48% of data breaches were caused by privileged misuse Proactively manage privileged access to prevent such attacks Who has access to privileged accounts? Administrators Contractors; Cloud Service Providers DBAs Terminated Employees Applications Why are these breaches happening? Shared account usage Excessive privilege Hidden/Sleeping accounts Non-existent/unenforced access controls Infrequent replacement of credentials * Verizon, 2010 Data Breach Investigations Report 4

Privileged Identity Management Suite v.7.0 External Vendors PIM Portal/Web Access Identity Management Ticketing Systems IT Personnel Auditors Central Policy Manager Secure Digital Vault Monitoring & SIEM Applications Enterprise Directory and more Developers & DBAs 5

Continuous Monitoring & Protection Across the Datacenter Expanding from Managing Accounts to Managing Sessions Isolate Privileged Session Management Suite PSM for Servers Control PSM for Databases PSM for Virtualization Monitor 6

Value of Privileged Session Management Isolate Prevent cyber attacks by isolating desktops from sensitive target machines Control Create accountability and control over privileged session access with policies, workflows and privileged single sign on Monitor Deliver continuous monitoring and compliance with session recording with zero footprint on target machines 7

What Our Customers Are Saying Cyber-Ark enables us to plan for future compliance requirements and seamlessly migrate to the cloud without any security concerns. - Dries Robberechts, Senior Technical Consultant Our people like the EPV concept and find the software easy to use. The software deployment and rollout was easy... - Mary Travers, Data Security Analyst We now have a fully-automated, 24/7 system that lowers operational risk and improves reporting and audit processes. - Burak Öztürk, Finansbank The new approach really improves our ability to manage all access to privileged accounts. - Mike Brannon, Senior Manager of Information Systems 8

Summary: Privileged Identity & Session Management A comprehensive platform for isolating and preemptively protecting your datacenter whether on premise or in the cloud Discover all privileged accounts across datacenter Manage and secure every credential Enforce policies for usage Record and monitor privileged activities React and comply 9