Our patented Digital Vault provides premier security.
Cyber-Ark kicked off 2011 with the launch of our Privileged Session Management Suite, generating strong product momentum out of the gate. It complements our market-leading PIM Suite and focuses on enabling organizations to improve compliance and risk management with the ability to isolate, control and record privileged access to databases, virtual environments and servers, using a common platform for reduced total cost of ownership.
Our annual Snooping Survey (Trust, Security & Passwords) received great PR success and media coverage, along with a recent glowing PIM Suite product review from Redmond Magazine.
Cyber-Ark recently held its third annual EMEA Summit, a conference dedicated to Customers and Partners across the region. Taking place on 15 - 16 June 2011 in Barcelona, Spain, the event featured a keynote speech from Robert Schifreen, the IT security expert, as well as several track sessions which provided attendees with best practice guides and indicators as to the next big security trends.
With security threats becoming more sophisticated and attacks more frequent, we felt as though it was an ideal time to launch our corporate blog, Privileged Insights. Privileged Insights is a platform for Cyber-Ark executives, customers, partners and other industry influencers to share their thoughts on breaking news, trends and security best practices. We'd welcome your input and feedback!
Udi Mokady, President & CEO
On-Demand Privileges Manager™ for Windows*
Cyber-Ark is extending its support for On-Demand Privileges Manager to now support Windows desktops and servers. This solution empowers users to perform tasks that otherwise require administrative rights in a controlled and fully audited manner. By defining the necessary policies for business users to perform their daily tasks, you are no longer jeopardizing security by giving them too strong privileges or limiting them by not giving them any privileges at all. The result is twofold: better productivity with greater security.
From a productivity perspective, IT is not depended upon to perform administrative tasks on end users desktops. Rather each desktop has pre-defined on demand elevation rules to run the administrative tasks that are necessary for their job (e.g. installing printers or Active X plug-ins) and in parallel reduces security breaches. Moreover, by eliminating administrative rights, less damage can be caused to personal desktops, significantly reducing total cost of ownership for the organization.
From a security perspective, recent studies have shown that as much as 90% of Windows vulnerabilities are mitigated when running with 'least privilege'.
Read more about the benefits of On-Demand Privileges Manager for Windows
*Delivered by Cyber-Ark, based on Avecto Software
Turning Virtualization Security into a Reality!
Hypervisor administrators have wider system access than the average administrator due to the nature of virtualized environments, as such; the new capabilities, power and sensitivity of these environments introduce a broader magnitude of risk to the organization.
With Cyber-Ark's Privileged Identity Management and Privileged Session Management for Virtualization you can control and monitor both the access to, as well as, the sessions on the Hypervisor and guest systems, creating accountability and visibility on these sensitive machines. Better still, to monitor these sensitive systems, there's no need to install software on the machine itself.
Read more about how Cyber-Ark secures the virtualized environment with a holistic and integrated approach
Choosing the right Managed File Transfer Solution!
Gartner has recently published a new research paper titled "How to Distinguish and Choose between MFT Solutions" (by Thomas Skybakmoen, Gartner, 21 April 2011). As the use of Managed File Transfer (MFT) solutions are becoming more commonplace is organizations of every size, this paper highlights the differences in the MFT market and provides a model which allows you to map MFT capabilities to short term and long term project requirements.
The top drivers for implementing a MFT solution include the growing volumes and size of files that need to be exchanged, file scheduling, securing data in transit and at rest, monitoring and auditing and being able to govern the whole process with scripting and exception handling capabilities.
Whatever your project requirements, you need to ensure that the solution you select best meets the basic MFT functionality "such as secure, reliable, high-performance large file transport". Moreover, assess how the solution delivers on integration, scalability and added capabilities.
Read more about the benefits of Cyber-Ark's Governed File Transfer suite
Cyber-Ark® Software recently announced new channel partnerships in the United States, Mexico and South America. These new relationships with value added resellers (VARs) Action Systems (Brazil), ARAME/Grupo Scanda (Mexico), SOS Security (TX) and Strategic Marketing Ventures (Federal) further expand Cyber-Ark's reach in these key markets while driving adoption of comprehensive Privileged Identity Management and Governed File Transfer solutions to help solve global IT security and compliance requirements.
We're pleased to inform you these new partnerships come on the heels of Cyber Ark's recent recognition by CRN Magazine as a 2011 "Need to Know: Emerging Security Vendor." According the publication, the list of 10 Emerging Vendors and their Channel Chiefs identifies opportunities for resellers to round out their product offerings in interesting and innovative ways
Strategic Spotlight: Courion
Courion Corporation, a Cyber-Ark reseller partner, is an independent software vendor based in Westborough, MA and a market leader in both Identity & Access Management (IAM) and Access Intelligence & Certification (GRC) solutions.
Cyber-Ark was recently honored by being showcased in a 45 minute presentation to all attendees of Courion's "Converge 2011" annual customer conference. The lecture, entitled Managing Access for Privileged Users, was delivered by Kurt Johnson, VP of Corporate Development at Courion. This session described the depth of the PIM problem and highlighted the existing (IAM) and GRC (entitlement) integrations between our respective solutions. Also attending and providing insight were noted market analysts Ian Glaser (Gartner – Identity & Access Mgmt.) and Rich Mogull (Securosis - DLP).