Introduction
This case study of Carlos Inc is based on a CyberArk internal review is based on a CyberArk internal progress review. This case study can only be distributed on a one-to-one basis and with previous internal approval.
CyberArk Case Study
This case study of Carlos Inc is based on a CyberArk internal review is based on a CyberArk internal progress review. This case study can only be distributed on a one-to-one basis and with previous internal approval.
Customer Success has helped Carlos Inc understand the attack chain, and set a roadmap to continuously reduce risk while enabling operational efficiencies. Customer Success’ project management skills and business and technological knowledge has helped the entire enterprise of Carlos Inc to understand privileged access and set the appropriate controls to protect it.
Carlos Inc leverages digital native solutions to sustain operations. Therefore using security solutions built for the cloud and can effectively balance security with operational efficiencies is instrumental to their success.
The business drivers that led Carlos Inc to evaluate and ultimately select CyberArk:
How is the customer now using CyberArk Solutions?
CyberArk Customer Success helped the customer achieve the following results:
Which CyberArk solutions are you currently using?
What CyberArk service did the Customer utilize?
Privileged access is protected across the entire workforce, from over 5,000 IT users to the entire 100,000 business users, and over 10 million secrets with one platform. The CyberArk Identity Security platform centrally secures it all with controls such as password rotation, session isolation, and adaptive MFA.
Secrets Hub and Secure Web Browser are the next steps for Carlos Inc. While the majority of Carlos Inc leverages AWS, some developers use Azure so Secrets Hub’s new capabilities to integrate with Azure will further enable operational efficiencies and security. Also with Secure Web Sessions, Carlos Inc plans to simplify and further protect its IT users privileged access.
This data was sourced directly from verified users of CyberArk Products by TechValidate.
TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.
More Research on CyberArk Products