Challenges
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
- Resolved the following challenges after using CyberArk:
- Securing credentials used by applications
- IT admins having more privileges than they truly need
- Unmanaged or unaudited third-party / remote vendor access
- Too many endpoints with local administrator privileges
- Adopted CyberArk’s privileged access security because of the following compelling business drivers:
- Initiated a proactive security project
- Experienced a breach
- Selected a solution for privileged access security to:
- Enforce strong passwords, store them in an encrypted vault, and rotate them
- Secure privileges on endpoints
Use Case
The key features and functionalities of CyberArk that the surveyed company uses:
- Uses CyberArk for the following:
- Securing privileged credentials in a vault
- Rotating credentials based on policies
- Securing and rotating shared service accounts
- Monitoring and recording privileged sessions
- Securing credentials used by applications
- Securing secrets used by DevOps and Continuous Integration/Continuous Delivery (CI/CD) tools
- Managing third-party / remote access
- Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
- Microsoft Windows admin accounts
- Network device accounts
- Database or application admin accounts
- Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
- Local admin accounts on workstations
- Secrets used by DevOps tools
- Service accounts
- SSH keys
- Plans to integrate the following tools with CyberArk within the next 18 months:
- Analytics (Palo Alto Networks, FireEye)
- Authentication (DUO or OKTA, RSA)
- DevOps (Docker, Chef, Puppet)
- Identity and access (Sailpoint, RSA)
- Orchestration and threat response (ServiceNow, ProofPoint)
- SIEM (Splunk, Fortinet, LogRhythm)
- Vulnerability management (Qualys, Rapid7, Tenable)
Results
The surveyed company achieved the following results with CyberArk:
- Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
- Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has stayed the same.
- Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has stayed the same.