0% found this document useful (0 votes)
518 views9 pages

Introducing Cyberark: Security For The Heart of The Enterprise

The document introduces CyberArk security solutions for protecting privileged accounts and access. It describes features for discovering, securing, and controlling privileged access, as well as detecting threats and responding to attacks in real-time through privileged account analytics and intelligence.

Uploaded by

santoshs2002848
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
518 views9 pages

Introducing Cyberark: Security For The Heart of The Enterprise

The document introduces CyberArk security solutions for protecting privileged accounts and access. It describes features for discovering, securing, and controlling privileged access, as well as detecting threats and responding to attacks in real-time through privileged account analytics and intelligence.

Uploaded by

santoshs2002848
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Introducing CyberArk

Security for the Heart of the Enterprise

Jan Kalcic
Sales Engineer – South EMEA
[email protected]
CyberArk’s Privileged Account Security Solution

REAL-TIME
THREAT Privileged Threat Analytics
DETECTION

Privileged
Enterprise Privileged Application On-Demand
PROACTIVE SSH Key
Threat
Password Session Identity Viewfinity Privileges
CONTROLS Manager
Vault®
Analytics Manager® Manager™ Manager™

Web Management Interface

SHARED Master Policy


TECHNOLOGY
PLATFORM Discovery Engine

Secure Digital Vault™

PROTECT DETECT RESPOND


Privileged accounts stored in highly secure vault

CyberArk Digital Vault uses “safe” architecture to enable granular access controls.
Safes and Vault are protected with seven layers of security

Hierarchical
Encryption

Tamper-Proof
Auditability

Comprehensive
Monitoring

Session
Segregation of Duties
Encryption

Built-in Firewall Authentication


Proactive Protection: How does it work?

End Users Enterprise Password Vault Enterprise Resources

Account Secure
Discovery Storage
Servers Mainframes

*****

Password Centralized
Rotation Policy Databases Applications

Network Security
CyberArk Web Portal Devices Appliances

Websites/ Cloud
Web Apps Infrastructure
Isolate Privileged Sessions: How does it work?

End Users CyberArk Solution Enterprise Resources

Digital Vault
Servers Mainframes

Passwords prevented
from reaching users
and devices
Databases Applications

Privileged Session
Manager
Malware blocked Network Security
on PSM to protect Devices Appliances
resources
Login via CyberArk Web Portal or
Native Unix Command Line

Tamper-proof recording and secure Websites/ Cloud


Web Apps Infrastructure
storage of complete audit trail

*Layered with Enterprise Password Vault


View and search for privileged session activities

 View session history by event


 Browse to replay specific activities

 Search for specific sessions or commands


 Replay sessions starting at that moment in time
CyberArk Privileged Threat Analytics

Collect

Collect and analyze the right data

Detect
Identify suspicious activities and
behaviors

Alert
Notify security teams with detailed
incident information

Respond
Enable speedy response and
automated containment
Four Critical Steps to Stopping Advanced Threats

Discover all of your privileged accounts

Protect and manage privileged account credentials

Control, isolate and monitor privileged access


to servers and databases

Use real-time privileged account intelligence to


detect and respond to in-progress attacks
Thank you!

You might also like