The key features and functionalities of CyberArk that the surveyed company uses:
- Uses CyberArk for the following:
- Securing privileged credentials in a vault
- Rotating credentials based on policies
- Securing and rotating shared service accounts
- Monitoring and recording privileged sessions
- Securing credentials used by applications
- Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
- Domain admin accounts
- Microsoft Windows admin accounts
- NIX admin accounts (UNIX and Linux)
- Network device accounts
- Database or application admin accounts
- Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
- Local admin accounts on workstations
- Application credentials
- Service accounts
- Plans to integrate the following tools with CyberArk within the next 18 months:
- Authentication (DUO or OKTA, RSA)
- The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
- Identity and access (Sailpoint, RSA)
- SIEM (Splunk, Fortinet, LogRhythm)
- Vulnerability management (Qualys, Rapid7, Tenable)
“Solid product that provides for tiered degrees of security depending on needs and budget.”