TechValidate Research on CyberArk Products


CyberArk Case Study

Medium Enterprise Health Care Technology Company

Introduction

This case study of a medium enterprise health care company is based on a March 2019 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“The Conjur service plays a part in ensuring that engineers practice proper data security. It also helps us pass certain compliance and certification requirements.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Business drivers that made them select Application Access Manager for DevOps:
    • Cloud adoption
  • Since adopting CyberArk Application Access Manager for DevOps, they feel they have solved the following challenges:
    • Centralized secrets management service 
    • Hardcoded and/or cleartext passwords

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Types of secrets or sensitive information Application Access Manager for DevOps is now managing or will be managing within the next 18 months:
    • Database passwords
    • SSL/SSH certificates
    • Application credentials
    • Encryption keys
  • Technologies they currently, or plan to, integrate Application Access Manager for DevOps with in the next 18 months:
    • Cloud (e.g., Amazon Web Services, Microsoft Azure, Google Cloud Platform) 
    • On-prem/Hybrid Paas & IaaS (HP, IBM, VMWare)
    • CI/CD Tools (Pupper, Chef, Jenkins)
    • Containers (Docker, Mesos)

Results

The surveyed company achieved the following results with CyberArk:

  • They would agree that CyberArk made it easy for them to solve their DevOps Security challenges.




About This Data

This data was sourced directly from verified users of CyberArk Products by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on CyberArk Products