CyberArk

CyberArk is a global leader in identity security. Known for its comprehensive approach to privileged account security, it takes a comprehensive approach to digital transformation and provides tools to automate authentication and privilege management. The solution works well in on-premises infrastructure and all possible cloud environments, providing local and remote access to critical resources - not only IT - but also OT/SCADA.

MORE INFORMATION:

https://www.cyberark.com/

Description of technology

Privileged Account Security

Conjur Enterprise - extends the functionality of Conjur Open Source with advanced enterprise-class features such as scalability, high availability (HA), advanced auditing and integration with CyberArk Vault, as well as applications included in the C3 Alliance integration ecosystem.

Conjur Open Source - a free solution designed for modern DevOps environments and cloud infrastructures. It enables secure storage, access control and distribution of secrets, such as passwords, API keys or certificates, across applications, containers and systems. Conjur integrates with popular platforms and tools to enable secrets management and authentication of machine identities.

CyberArk Endpoint Privilege Manager (EPM) - a solution dedicated to endpoint privilege management. EPM enables elimination of default administrative access on end stations, while allowing users to perform authorized operations that require elevated privileges in a secure and controlled manner. EPM enables precise policy management and automatic privilege elevation for approved applications, reducing the risk of privilege escalation. In addition, the solution provides detailed monitoring and reporting of workstation-level activity to support regulatory compliance.

CyberArk Privileged Account Manager (PAM) - offers a comprehensive solution for protecting privileged accounts. It enables implementation of a consistent credential management policy for both users, as well as systems, services or applications. Passwords and keys are stored in an encrypted vault that provides a full audit trail, protecting the organization from attacks based on unauthorized acquisition of privileged account credentials.

User Authentication

Identity - enables protection of digital identity through adaptive multi-factor authentication (AMFA) and adaptive single sign-on (ASSO). It enables control of access to local and cloud applications, supports the processes of granting, changing and revoking access. With Secure Web Session (SWS), it allows administrators to monitor web sessions, while an additional browser component - Secure Browser - protects users' credentials and cookies from identity theft.

Helpful files