TechValidate Research on CyberArk Products


CyberArk Case Study

Case Study: Leading Private Research University

Introduction

This case study of a educational institution is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.

“There is very little you can do to secure domain administrators out of the box, CyberArk has helped us secure those credentials and much more. From an auditing standpoint, it’s much better to be able to say we cycle passwords daily vs. we have no policy.”

Challenges

The business challenges that led the profiled organization to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Unmanaged or unaudited third-party / remote vendor access
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Wanted to be better prepared for an audit
    • Were driven by a board-level or executive mandate
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements

Use Case

The key features and functionalities of CyberArk that the surveyed organization uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Application credentials
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)

Results

The surveyed organization achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now much more secure.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.




About This Data

This data was sourced directly from verified users of CyberArk Products by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on CyberArk Products