Introduction
This case study of Carlos Inc is based on a CyberArk internal review is based on a CyberArk internal progress review. This case study can only be distributed on a one-to-one basis and with previous internal approval.
CyberArk Case Study
This case study of Carlos Inc is based on a CyberArk internal review is based on a CyberArk internal progress review. This case study can only be distributed on a one-to-one basis and with previous internal approval.
Customer Success has helped Carlos Inc understand the attack chain, and set a roadmap to continuously reduce risk while enabling operational efficiencies. Customer Success’ project management skills and business and technological knowledge has helped the entire enterprise of Carlos Inc to understand privileged access and set the appropriate controls to protect it.
Carlos Inc leverages digital native solutions to sustain operations. Therefore using security solutions built for the cloud and can effectively balance security with operational efficiencies is instrumental to their success.
The business drivers that led Carlos Inc to evaluate and ultimately select CyberArk:
How is the customer now using CyberArk Solutions?
CyberArk Customer Success helped the customer achieve the following results:
Which CyberArk solutions are you currently using?
What CyberArk service did the Customer utilize?
Privileged access is protected across the entire workforce, from over 5,000 IT users to the entire 100,000 business users, and over 10 million secrets with one platform. The CyberArk Identity Security platform centrally secures it all with controls such as password rotation, session isolation, and adaptive MFA.
Secrets Hub and Secure Web Browser are the next steps for Carlos Inc. While the majority of Carlos Inc leverages AWS, some developers use Azure so Secrets Hub’s new capabilities to integrate with Azure will further enable operational efficiencies and security. Also with Secure Web Sessions, Carlos Inc plans to simplify and further protect its IT users privileged access.
CyberArk Case Study
This case study of a medium enterprise health care company is based on a March 2019 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“The Conjur service plays a part in ensuring that engineers practice proper data security. It also helps us pass certain compliance and certification requirements.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of Voya Financial is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.
“The use of CyberArk has made our security organization analyze how privileged accounts are utilized and can be compromised. More importantly, through the management of the privileged access lifecycle, we are continually taking steps to keep our secrets secure utilizing CyberArk. "
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
“I believe CyberArk offers very good products, with good customer support, and is a leading security technology.”
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a medium enterprise financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Management of privileged accounts, credentials, and secrets should be one of the core considerations of an overall security strategy as an attack will constantly try to compromise any type of credential to attempt to extract new credentials to move laterally throughout an environment. Although, if you’re using CyberArk and rotating your credentials at aggressive frequencies with a one-time password the risk is mitigated to stop attackers in their tracks.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
“The PAS (Privileged Access Security) solution CyberArk offers has a wide variety of use cases that are readily apparent, and there are plenty of creative ways to apply use cases that are out of the norm with the tool. In my opinion, the PAS solution covers all aspects of privileged account management, and the only shortfall with it is the reporting/dashboarding end directly within the platform. Although if Splunk is available the data that CyberArk pushes to Splunk is more than adequate to create the needed dashboards.”
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a large enterprise insurance company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Prior to adopting a password manager, shared/service account passwords were simple, widely shared, and almost never changed. The passwords are now randomly generated and rotated on a schedule. We are working towards system owners not even needing to see the passwords.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a small business health care company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Our systems are critical to patient care. Compromised account credentials or compromised applications can lead to PHI/PII exposure and/or outages to patient care systems. CyberArk PAS (Privileged Access Security) gives us the ability to expose and understand where our risks are, allowing us to take steps to secure things better.”
“Good feature set for securing privileged identities.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
“Good feature set for securing privileged Identities.”
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a large enterprise financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“CyberArk is very powerful, flexible, I like the modular approach – use what you need, support and customer success resources are top notch.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a S&P 500 professional services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Introducing the automated password rotation into an environment that had stale passwords due to the previous requirement of manual password changes has freed us up to focus on the actual Security events and also reduces risk of exposure to this additional attack vector.”
“The support provided by the Customer Success team and Support organization has been exemplary.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a S&P 500 energy & utilities company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Learning more about CyberArk, attending conferences/forums, and webinars have really helped us to think like an attacker and pull off the blinders around how vulnerable our systems really are.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of Country Mutual Insurance Company, Inc. is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.
“Working in the finance industry it is paramount that we as an organization protect privileged accounts that have access to customer PII. CyberArk has helped us to rotate credentials to privileged accounts and utilize strong passwords making it difficult for attackers to infiltrate and escalate privileges.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
“CyberArk is an excellent resource for protecting and managing privileged accounts in the corporate environment.”
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a S&P 500 health care company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Securing privileged credentials is a cornerstone to building a secure infrastructure and CyberArk is an integral tool to accomplish this.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
“Solid product that provides for tiered degrees of security depending on needs and budget.”
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of Harris Corporation is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.
“By eliminating the need for individual network engineers to access the privileged account passwords to accomplish their mission, we have eliminated the passive storing of passwords by the teams. No password spreadsheets mean more secure passwords.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
“In my experience, CyberArk PAS provides the most effective enterprise-level solution for securing privileged account credentials.”
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a large enterprise financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Securing privileged accounts and credentials is critical to our overall security strategy because we are a financial institution and retain customer’s personally identifiable information. It is critical that we not only meet compliance requirements, but that we do everything possible to prevent a breach. Should a breach occur, we must do everything possible to prevent the breach from escalating.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a large enterprise financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“CyberArk is becoming more and more critical in our day to day environment.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a Fortune 500 electronics company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“CyberArk is a critical part of our defense in depth strategy because it enables us to lock down, control, monitor, and audit our ‘keys to the kingdom’.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a large enterprise banking company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“It is critical to our overall security strategy because most attacks take place with stolen credentials. CyberArk helps by adding layers of security that would make it more difficult for an attacker to get through.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a Fortune 500 Computer and Network Security Company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.
“Old-school IT security focused almost exclusively on perimeter but the attack vector has shifted in the past decade to focus on internal threats via phishing, social engineering, etc. The combination of securely vaulting privileged credentials, requiring MFA access, session recording and isolation, and SIEM integration best protects our privileged accounts.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a large enterprise automotive & transport company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Privileged accounts is the one of the primary attack vectors and needs a security and governance. In a very large, agile enterprise environment, a tool to manage, control and audit the usage of privileged accounts is absolutely mandatory. "
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a S&P 500 banking company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Putting our accounts behind a secure encrypted vault is ideal for Audit and Risk from every angle. We need to be compliant and stay ahead of the game. Protection is our company’s #1 IT focus.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a Global 500 financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Most breaches are a result of poorly secured privileged account credentials. CyberArk secures this threat with its best of breed products in the marketplace.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a S&P 500 financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“I think CyberArk is one of the most comprehensive PAS (Privileged Access Security) solutions out there on the market with a lot of out of the box integration. Securing privileged accounts, credentials, and secrets will help reduce the attack surface of our network from outside threats as well as protecting us from insider threats as well.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a Global 500 insurance company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Privileged accounts are the keys to the kingdom. They need to be kept secure and passwords rotated on a regular basis to make it harder for attackers.”
“CyberArk is very easy to work with and has done a good job with the support of the product.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
“CyberArk is very easy to work with and has done a good job with the support of the product.”
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a educational institution is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.
“There is very little you can do to secure domain administrators out of the box, CyberArk has helped us secure those credentials and much more. From an auditing standpoint, it’s much better to be able to say we cycle passwords daily vs. we have no policy.”
The business challenges that led the profiled organization to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed organization uses:
The surveyed organization achieved the following results with CyberArk:
CyberArk Case Study
This case study of a Large Biotechnology Company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.
CyberArk provides the best solutions to manage privileged high risk accounts.
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a Global 500 chemicals company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Keeping privileged credentials stored in the vault and auto managed makes it virtually impossible for an attacker to steal the credentials. In the case that vaulted credentials do become compromised, we utilize aggressive rotation policies so the password is not even good for more than a business day.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a large enterprise banking company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Eliminating the ability for intruders to move laterally through the environment in the event of a breach is critical in reducing data loss. Using CyberArk to harden the most critical credentials in the organization helps us to enforce stronger layered security.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a Global 500 E-Commerce Corporation is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.
Cyberark is a user-friendly tool, we can easily do integration/implementations to protect our passwords in our environment compared with other tools.
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of Great American Insurance Group is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.
We have used CyberArk for several years, as it allows our business units to continue to work securely."
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of Agilent Technologies is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk:
CyberArk Case Study
This case study of a Fortune 500 industrial manufacturing company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Threats can come from inside and we want to mitigate our risks. Changing the passwords more frequently has helped us to do that.”
The business challenges that led the profiled company to evaluate and ultimately select CyberArk:
The key features and functionalities of CyberArk that the surveyed company uses:
The surveyed company achieved the following results with CyberArk: