TechValidate Research on CyberArk Products

62 Case Studies – Page 1 of 3


CyberArk Case Study

Carlos Inc Customer Success Story

Introduction

This case study of Carlos Inc is based on a CyberArk internal review is based on a CyberArk internal progress review. This case study can only be distributed on a one-to-one basis and with previous internal approval.

Customer Success has helped Carlos Inc understand the attack chain, and set a roadmap to continuously reduce risk while enabling operational efficiencies. Customer Success’ project management skills and business and technological knowledge has helped the entire enterprise of Carlos Inc to understand privileged access and set the appropriate controls to protect it.

Challenges

Carlos Inc leverages digital native solutions to sustain operations. Therefore using security solutions built for the cloud and can effectively balance security with operational efficiencies is instrumental to their success.

The business drivers that led Carlos Inc to evaluate and ultimately select CyberArk:

  • Deliver Measurable Cyber-Risk Reduction
  • Enable Operational Efficiency

Use Case

How is the customer now using CyberArk Solutions?

  • Secure All Identities with Intelligent Privilege Controls
  • Reduce Risk by Increasing Control and Visibility of Privileged Access
  • Meet Cyber Insurance Requirements for Privileged Accounts
  • Secure Vendor / Third-party Access
  • Secure Workforce Access
  • Secure Workforce Passwords
  • Ensure Continuous Compliance of Privileged Access
  • Implement Secrets Management Essentials
  • Cloud Security

CyberArk Customer Success helped the customer achieve the following results:

  • Helped the customer understand the attack chain
  • Empowered our champions to drive cross-functional and executive support
  • Helped the customer develop a measurable risk reduction roadmap
  • Project-managed services engagements to implement automations and reliability
  • Organized CEC meetings that helped Carlos Inc’s CEO build relationships with CyberArk’s C-level executives

Which CyberArk solutions are you currently using?

  • CyberArk Privilege Cloud
  • Remote Access (formerly known as Alero)
  • Dynamic Privileged Access
  • Conjur Cloud
  • Identity (formerly known as Idaptive)
  • Multi-Factor Authentication (MFA)
  • Single Sign-On
  • Workforce Password Management (WPM)
  • Secure Web Sessions
  • Lifecycle Management
  • Directory Services
  • Identity Security Platform Shared Services
  • Cloud Entitlements Manager

What CyberArk service did the Customer utilize?

  • Program Development Package
  • Red Team Package
  • Privileged User SaaS Setup – Partner Plus
  • Success Plan
  • CyberArk Blueprint

Results

Privileged access is protected across the entire workforce, from over 5,000 IT users to the entire 100,000 business users, and over 10 million secrets with one platform. The CyberArk Identity Security platform centrally secures it all with controls such as password rotation, session isolation, and adaptive MFA.

Secrets Hub and Secure Web Browser are the next steps for Carlos Inc. While the majority of Carlos Inc leverages AWS, some developers use Azure so Secrets Hub’s new capabilities to integrate with Azure will further enable operational efficiencies and security. Also with Secure Web Sessions, Carlos Inc plans to simplify and further protect its IT users privileged access.

CyberArk Case Study

Medium Enterprise Health Care Technology Company

Introduction

This case study of a medium enterprise health care company is based on a March 2019 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“The Conjur service plays a part in ensuring that engineers practice proper data security. It also helps us pass certain compliance and certification requirements.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Business drivers that made them select Application Access Manager for DevOps:
    • Cloud adoption
  • Since adopting CyberArk Application Access Manager for DevOps, they feel they have solved the following challenges:
    • Centralized secrets management service 
    • Hardcoded and/or cleartext passwords

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Types of secrets or sensitive information Application Access Manager for DevOps is now managing or will be managing within the next 18 months:
    • Database passwords
    • SSL/SSH certificates
    • Application credentials
    • Encryption keys
  • Technologies they currently, or plan to, integrate Application Access Manager for DevOps with in the next 18 months:
    • Cloud (e.g., Amazon Web Services, Microsoft Azure, Google Cloud Platform) 
    • On-prem/Hybrid Paas & IaaS (HP, IBM, VMWare)
    • CI/CD Tools (Pupper, Chef, Jenkins)
    • Containers (Docker, Mesos)

Results

The surveyed company achieved the following results with CyberArk:

  • They would agree that CyberArk made it easy for them to solve their DevOps Security challenges.

CyberArk Case Study

Case Study: Fortune 500 Financial Services Company

Introduction

This case study of Voya Financial is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.

“The use of CyberArk has made our security organization analyze how privileged accounts are utilized and can be compromised. More importantly, through the management of the privileged access lifecycle, we are continually taking steps to keep our secrets secure utilizing CyberArk. "

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Unmanaged or unaudited third-party / remote vendor access
    • Auditing the use of privileged access in production systems
    • Too many endpoints with local administrator privileges
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Failed an audit
    • Initiated a proactive security project
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Secure privileges on endpoints

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Application credentials
    • Secrets used by DevOps tools
    • Service accounts
    • SSH keys
    • Robotic process automations
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • DevOps (Docker, Chef, Puppet)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

“I believe CyberArk offers very good products, with good customer support, and is a leading security technology.”

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced a lot.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has stayed the same.

CyberArk Case Study

Case Study: Medium Enterprise Financial Services Company

Introduction

This case study of a medium enterprise financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Management of privileged accounts, credentials, and secrets should be one of the core considerations of an overall security strategy as an attack will constantly try to compromise any type of credential to attempt to extract new credentials to move laterally throughout an environment. Although, if you’re using CyberArk and rotating your credentials at aggressive frequencies with a one-time password the risk is mitigated to stop attackers in their tracks.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • IT admins not rotating privileged credentials in a timely fashion
    • Protecting assets running in the cloud
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Were driven by a board-level or executive mandate
    • Wanted to be better prepared for an audit
    • Failed an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure infrastructure and assets in the cloud
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Local admin accounts on workstations
    • Application credentials
    • Secrets used by DevOps tools
    • Service accounts
    • SSH keys
    • Robotic process automations
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • DevOps (Docker, Chef, Puppet)
    • Discovery (ForeScout, BMC)
    • Identity and access (Sailpoint, RSA)
    • Orchestration and threat response (ServiceNow, ProofPoint)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

“The PAS (Privileged Access Security) solution CyberArk offers has a wide variety of use cases that are readily apparent, and there are plenty of creative ways to apply use cases that are out of the norm with the tool. In my opinion, the PAS solution covers all aspects of privileged account management, and the only shortfall with it is the reporting/dashboarding end directly within the platform. Although if Splunk is available the data that CyberArk pushes to Splunk is more than adequate to create the needed dashboards.”

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced a lot.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced dramatically.

CyberArk Case Study

Case Study: Large Enterprise Insurance Company

Introduction

This case study of a large enterprise insurance company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Prior to adopting a password manager, shared/service account passwords were simple, widely shared, and almost never changed. The passwords are now randomly generated and rotated on a schedule. We are working towards system owners not even needing to see the passwords.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • Unmanaged or unaudited third-party / remote vendor access
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure third-party access

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
    • Managing third-party / remote access
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Network device accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Application credentials
    • Secrets used by DevOps tools
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • Identity and access (Sailpoint, RSA)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced a lot.

CyberArk Case Study

Case Study: Public Research University Health System

Introduction

This case study of a small business health care company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Our systems are critical to patient care. Compromised account credentials or compromised applications can lead to PHI/PII exposure and/or outages to patient care systems. CyberArk PAS (Privileged Access Security) gives us the ability to expose and understand where our risks are, allowing us to take steps to secure things better.”

“Good feature set for securing privileged identities.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Securing credentials used by applications
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure privileges on endpoints

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing credentials used by applications
    • Securing secrets used by DevOps and Continuous Integration/Continuous Delivery (CI/CD) tools
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Application credentials
    • Secrets used by DevOps tools
    • Service accounts
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • DevOps (Docker, Chef, Puppet)

“Good feature set for securing privileged Identities.”

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has stayed the same.

CyberArk Case Study

Case Study: Large Enterprise Financial Services Company

Introduction

This case study of a large enterprise financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“CyberArk is very powerful, flexible, I like the modular approach – use what you need, support and customer success resources are top notch.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • Unmanaged or unaudited third-party / remote vendor access
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
    • Managing third-party / remote access
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Local admin accounts on workstations
    • Application credentials
    • Secrets used by DevOps tools
    • Service accounts
    • SSH keys
    • Robotic process automations
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Identity and access (Sailpoint, RSA)
    • Orchestration and threat response (ServiceNow, ProofPoint)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced dramatically.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced dramatically.

CyberArk Case Study

Case Study: S&P 500 Payroll Services Company

Introduction

This case study of a S&P 500 professional services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Introducing the automated password rotation into an environment that had stale passwords due to the previous requirement of manual password changes has freed us up to focus on the actual Security events and also reduces risk of exposure to this additional attack vector.”

“The support provided by the Customer Success team and Support organization has been exemplary.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Application credentials
    • Service accounts
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Analytics (Palo Alto Networks, FireEye)
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • Identity and access (Sailpoint, RSA)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced a lot.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced dramatically.

CyberArk Case Study

Case Study: S&P 500 Public Utilities Holding Company

Introduction

This case study of a S&P 500 energy & utilities company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Learning more about CyberArk, attending conferences/forums, and webinars have really helped us to think like an attacker and pull off the blinders around how vulnerable our systems really are.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Unmanaged or unaudited third-party / remote vendor access
    • Too many endpoints with local administrator privileges
    • Regulatory security and compliance.
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Were driven by a board-level or executive mandate
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • PSM / secure jump host

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Monitoring and recording privileged sessions
    • Managing third-party / remote access
    • Securing workstations by removing local privileges
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Generation systems and vendor accounts. Win/NIX admins currently in REG environment only.
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • SIEM (Splunk, Fortinet, LogRhythm)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Large Enterprise Insurance Company

Introduction

This case study of Country Mutual Insurance Company, Inc. is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.

“Working in the finance industry it is paramount that we as an organization protect privileged accounts that have access to customer PII. CyberArk has helped us to rotate credentials to privileged accounts and utilize strong passwords making it difficult for attackers to infiltrate and escalate privileges.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Securing credentials used by applications
    • Unmanaged or unaudited third-party / remote vendor access
    • IT admins having more privileges than they truly need
    • Too many endpoints with local administrator privileges
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Wanted to be better prepared for an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
    • Managing third-party / remote access
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Local admin accounts on workstations
    • Application credentials
    • Service accounts

“CyberArk is an excellent resource for protecting and managing privileged accounts in the corporate environment.”

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced dramatically.

CyberArk Case Study

Case Study: S&P 500 Health Care Company

Introduction

This case study of a S&P 500 health care company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Securing privileged credentials is a cornerstone to building a secure infrastructure and CyberArk is an integral tool to accomplish this.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • Too many endpoints with local administrator privileges
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Local admin accounts on workstations
    • Application credentials
    • Service accounts
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • Identity and access (Sailpoint, RSA)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

“Solid product that provides for tiered degrees of security depending on needs and budget.”

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: S&P 500 Telecommunications Services Company

Introduction

This case study of Harris Corporation is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.

“By eliminating the need for individual network engineers to access the privileged account passwords to accomplish their mission, we have eliminated the passive storing of passwords by the teams. No password spreadsheets mean more secure passwords.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Were driven by a board-level or executive mandate
    • Failed an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Securing credentials used by applications
    • Securing secrets used by DevOps and Continuous Integration/Continuous Delivery (CI/CD) tools
    • Securing workstations by removing local privileges
    • Flagging and reviewing high-risk activity
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Local admin accounts on workstations
    • Secrets used by DevOps tools
    • Service accounts
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • Identity and access (Sailpoint, RSA)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

“In my experience, CyberArk PAS provides the most effective enterprise-level solution for securing privileged account credentials.”

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced dramatically.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has stayed the same.

CyberArk Case Study

Case Study: Large Enterprise Bank Holding Company

Introduction

This case study of a large enterprise financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Securing privileged accounts and credentials is critical to our overall security strategy because we are a financial institution and retain customer’s personally identifiable information. It is critical that we not only meet compliance requirements, but that we do everything possible to prevent a breach. Should a breach occur, we must do everything possible to prevent the breach from escalating.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Too many endpoints with local administrator privileges
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
    • Were driven by a board-level or executive mandate
    • Failed an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Detecting and responding to attempts to circumvent privileged access controls
    • Securing credentials used by applications
    • Securing workstations by removing local privileges
    • Flagging and reviewing high-risk activity
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Local admin accounts on workstations
    • Application credentials
    • Service accounts
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • DevOps (Docker, Chef, Puppet)
    • Identity and access (Sailpoint, RSA)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced dramatically.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has stayed the same.

CyberArk Case Study

Case Study: Large Multinational Investment Company

Introduction

This case study of a large enterprise financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“CyberArk is becoming more and more critical in our day to day environment.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Protecting assets running in the cloud
    • Cloud platforms not easily configured.
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Were driven by a board-level or executive mandate
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure third-party access
    • Secure privileges on endpoints
    • Secure infrastructure and assets in the cloud

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Detecting and responding to attempts to circumvent privileged access controls
    • Securing secrets used by DevOps and Continuous Integration/Continuous Delivery (CI/CD) tools
    • Flagging and reviewing high-risk activity
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Local admin accounts on workstations
    • Service accounts
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • Identity and access (Sailpoint, RSA)
    • Orchestration and threat response (ServiceNow, ProofPoint)
    • SIEM (Splunk, Fortinet, LogRhythm)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has stayed the same.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Large Biotechnology Company

Introduction

This case study of a Fortune 500 electronics company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“CyberArk is a critical part of our defense in depth strategy because it enables us to lock down, control, monitor, and audit our ‘keys to the kingdom’.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Unmanaged or unaudited third-party / remote vendor access
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure third-party access
    • Secure infrastructure and assets in the cloud

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Application credentials
    • Secrets used by DevOps tools
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • DevOps (Docker, Chef, Puppet)
    • Identity and access (Sailpoint, RSA)
    • Application accounts

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has stayed the same.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Large Enterprise Bank Holding Company

Introduction

This case study of a large enterprise banking company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“It is critical to our overall security strategy because most attacks take place with stolen credentials. CyberArk helps by adding layers of security that would make it more difficult for an attacker to get through.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • IT admins having more privileges than they truly need
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Wanted to be better prepared for an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
    • Managing third-party / remote access
    • Securing workstations by removing local privileges
    • Flagging and reviewing high-risk activity
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Local admin accounts on workstations
    • Service accounts
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Fortune 500 Computer and Network Security Company

Introduction

This case study of a Fortune 500 Computer and Network Security Company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.

“Old-school IT security focused almost exclusively on perimeter but the attack vector has shifted in the past decade to focus on internal threats via phishing, social engineering, etc. The combination of securely vaulting privileged credentials, requiring MFA access, session recording and isolation, and SIEM integration best protects our privileged accounts.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Securing credentials used by applications
    • Too many endpoints with local administrator privileges
    • Protecting assets running in the cloud
    • Lack of centralized logs/session recordings for audit
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Failed an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure infrastructure and assets in the cloud
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Local admin accounts on workstations
    • Application credentials
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • Identity and access (Sailpoint, RSA)
    • Orchestration and threat response (ServiceNow, ProofPoint)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has stayed the same.

CyberArk Case Study

Case Study: Global 500 Industrial Manufacturing and Electronics Conglomerate

Introduction

This case study of a large enterprise automotive & transport company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Privileged accounts is the one of the primary attack vectors and needs a security and governance. In a very large, agile enterprise environment, a tool to manage, control and audit the usage of privileged accounts is absolutely mandatory. "

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Too many endpoints with local administrator privileges
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Were driven by a board-level or executive mandate
    • Experienced a breach
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure infrastructure and assets in the cloud
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Application credentials
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • DevOps (Docker, Chef, Puppet)
    • Identity and access (Sailpoint, RSA)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced a lot.

CyberArk Case Study

Case Study: S&P 500 Bank Holding Company

Introduction

This case study of a S&P 500 banking company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Putting our accounts behind a secure encrypted vault is ideal for Audit and Risk from every angle. We need to be compliant and stay ahead of the game. Protection is our company’s #1 IT focus.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Unmanaged or unaudited third-party / remote vendor access
    • Too many endpoints with local administrator privileges
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
    • Were driven by a board-level or executive mandate
    • Failed an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Secure third-party access
    • Secure privileges on endpoints
    • Secure infrastructure and assets in the cloud
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Detecting and responding to attempts to circumvent privileged access controls
    • Securing credentials used by applications
    • Managing third-party / remote access
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Application credentials
    • Service accounts
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Global 500 Financial Services Company

Introduction

This case study of a Global 500 financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Most breaches are a result of poorly secured privileged account credentials. CyberArk secures this threat with its best of breed products in the marketplace.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Unmanaged or unaudited third-party / remote vendor access
    • Too many endpoints with local administrator privileges
    • Protecting assets running in the cloud
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure third-party access
    • Secure privileges on endpoints
    • Secure infrastructure and assets in the cloud
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Local admin accounts on workstations
    • Application credentials
    • Secrets used by DevOps tools
    • Service accounts
    • SSH keys
    • Robotic process automations
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Analytics (Palo Alto Networks, FireEye)
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • DevOps (Docker, Chef, Puppet)
    • Identity and access (Sailpoint, RSA)
    • Orchestration and threat response (ServiceNow, ProofPoint)
    • Robotic process automation (BluePrism, UI path)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced a lot.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced a lot.

CyberArk Case Study

Case Study: S&P 500 Financial Services Company

Introduction

This case study of a S&P 500 financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“I think CyberArk is one of the most comprehensive PAS (Privileged Access Security) solutions out there on the market with a lot of out of the box integration. Securing privileged accounts, credentials, and secrets will help reduce the attack surface of our network from outside threats as well as protecting us from insider threats as well.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Too many endpoints with local administrator privileges
    • Protecting assets running in the cloud
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
    • Were driven by a board-level or executive mandate
    • Failed an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure third-party access
    • Secure privileges on endpoints
    • Secure infrastructure and assets in the cloud
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Detecting and responding to attempts to circumvent privileged access controls
    • Securing credentials used by applications
    • Securing workstations by removing local privileges
    • Flagging and reviewing high-risk activity
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Local admin accounts on workstations
    • Application credentials
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Analytics (Palo Alto Networks, FireEye)
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • DevOps (Docker, Chef, Puppet)
    • Identity and access (Sailpoint, RSA)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Global 500 Insurance Company

Introduction

This case study of a Global 500 insurance company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Privileged accounts are the keys to the kingdom. They need to be kept secure and passwords rotated on a regular basis to make it harder for attackers.”

“CyberArk is very easy to work with and has done a good job with the support of the product.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • Too many endpoints with local administrator privileges
    • Changing root password on large number of unix\linux servers
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
  • Selected a solution for privileged access security to:
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Local admin accounts on workstations
    • Application credentials
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • Identity and access (Sailpoint, RSA)
    • Robotic process automation (BluePrism, UI path)

“CyberArk is very easy to work with and has done a good job with the support of the product.”

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced a lot.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Leading Private Research University

Introduction

This case study of a educational institution is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.

“There is very little you can do to secure domain administrators out of the box, CyberArk has helped us secure those credentials and much more. From an auditing standpoint, it’s much better to be able to say we cycle passwords daily vs. we have no policy.”

Challenges

The business challenges that led the profiled organization to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Unmanaged or unaudited third-party / remote vendor access
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
    • Were driven by a board-level or executive mandate
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements

Use Case

The key features and functionalities of CyberArk that the surveyed organization uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Application credentials
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)

Results

The surveyed organization achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Large Biotechnology Company

Introduction

This case study of a Large Biotechnology Company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.

CyberArk provides the best solutions to manage privileged high risk accounts.

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • IT admins having more privileges than they truly need
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Failed an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
    • Managing third-party / remote access
    • Securing workstations by removing local privileges
    • Flagging and reviewing high-risk activity
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Network device accounts
    • Application credentials
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Analytics (Palo Alto Networks, FireEye)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced a lot.

CyberArk Case Study

Case Study: Global 500 Mechanical and Industrial Engineering Company

Introduction

This case study of a Global 500 chemicals company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Keeping privileged credentials stored in the vault and auto managed makes it virtually impossible for an attacker to steal the credentials. In the case that vaulted credentials do become compromised, we utilize aggressive rotation policies so the password is not even good for more than a business day.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Too many endpoints with local administrator privileges
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
    • Were driven by a board-level or executive mandate
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Detecting and responding to attempts to circumvent privileged access controls
    • Securing credentials used by applications
    • Securing secrets used by DevOps and Continuous Integration/Continuous Delivery (CI/CD) tools
    • Securing workstations by removing local privileges
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Local admin accounts on workstations
    • Application credentials
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Analytics (Palo Alto Networks, FireEye)
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • DevOps (Docker, Chef, Puppet)
    • Identity and access (Sailpoint, RSA)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Large Enterprise Bank Holding Company

Introduction

This case study of a large enterprise banking company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Eliminating the ability for intruders to move laterally through the environment in the event of a breach is critical in reducing data loss. Using CyberArk to harden the most critical credentials in the organization helps us to enforce stronger layered security.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Rampant password reuse across multiple accounts
    • IT admins having more privileges than they truly need
    • Too many endpoints with local administrator privileges
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
    • Were driven by a board-level or executive mandate
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Secure third-party access
    • Secure infrastructure and assets in the cloud

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • NIX admin accounts (UNIX and Linux)
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Local admin accounts on workstations
    • Service accounts
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • Identity and access (Sailpoint, RSA)
    • Robotic process automation (BluePrism, UI path)
    • SIEM (Splunk, Fortinet, LogRhythm)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Global 500 E-Commerce Corporation

Introduction

This case study of a Global 500 E-Commerce Corporation is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.

Cyberark is a user-friendly tool, we can easily do integration/implementations to protect our passwords in our environment compared with other tools.

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Unmanaged or unaudited third-party / remote vendor access
    • Too many endpoints with local administrator privileges
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure third-party access
    • Secure privileges on endpoints
    • Secure infrastructure and assets in the cloud
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Securing credentials used by applications
    • Securing workstations by removing local privileges
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Local admin accounts on workstations
    • Application credentials
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • Discovery (ForeScout, BMC)
    • Identity and access (Sailpoint, RSA)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced a lot.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Great American Insurance Group

Introduction

This case study of Great American Insurance Group is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.

We have used CyberArk for several years, as it allows our business units to continue to work securely."

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Unmanaged or unaudited third-party / remote vendor access
    • Too many endpoints with local administrator privileges
    • Protecting assets running in the cloud
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
    • Were driven by a board-level or executive mandate
    • Failed an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure third-party access
    • Secure privileges on endpoints
    • Secure infrastructure and assets in the cloud
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Detecting and responding to attempts to circumvent privileged access controls
    • Securing credentials used by applications
    • Securing secrets used by DevOps and Continuous Integration/Continuous Delivery (CI/CD) tools
    • Managing third-party / remote access
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • Application credentials
    • Secrets used by DevOps tools
    • Robotic process automations
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • DevOps (Docker, Chef, Puppet)
    • Orchestration and threat response (ServiceNow, ProofPoint)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced dramatically.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Large Biotechnology Company

Introduction

This case study of Agilent Technologies is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service.

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • IT admins having more privileges than they truly need
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Failed an audit
    • Experienced a breach
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Robotic process automations
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Analytics (Palo Alto Networks, FireEye)
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • Discovery (ForeScout, BMC)
    • Identity and access (Sailpoint, RSA)
    • Robotic process automation (BluePrism, UI path)
    • SIEM (Splunk, Fortinet, LogRhythm)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced a lot.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced a lot.

CyberArk Case Study

Case Study: Fortune 500 Industrial Manufacturing Company

Introduction

This case study of a Fortune 500 industrial manufacturing company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Threats can come from inside and we want to mitigate our risks. Changing the passwords more frequently has helped us to do that.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Rampant password reuse across multiple accounts
    • IT admins having more privileges than they truly need
    • Unmanaged or unaudited third-party / remote vendor access
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
    • Were driven by a board-level or executive mandate
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure third-party access
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Detecting and responding to attempts to circumvent privileged access controls
    • Securing workstations by removing local privileges
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Local admin accounts on workstations
    • Application credentials
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Analytics (Palo Alto Networks, FireEye)
    • Identity and access (Sailpoint, RSA)
    • SIEM (Splunk, Fortinet, LogRhythm)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced a lot.



More Research on CyberArk Products