TechValidate Research on CyberArk Products


CyberArk Case Study

Case Study: Public Research University Health System

Introduction

This case study of a small business health care company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Our systems are critical to patient care. Compromised account credentials or compromised applications can lead to PHI/PII exposure and/or outages to patient care systems. CyberArk PAS (Privileged Access Security) gives us the ability to expose and understand where our risks are, allowing us to take steps to secure things better.”

“Good feature set for securing privileged identities.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Securing credentials used by applications
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure privileges on endpoints

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing credentials used by applications
    • Securing secrets used by DevOps and Continuous Integration/Continuous Delivery (CI/CD) tools
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Application credentials
    • Secrets used by DevOps tools
    • Service accounts
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • DevOps (Docker, Chef, Puppet)

“Good feature set for securing privileged Identities.”

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has stayed the same.




About This Data

This data was sourced directly from verified users of CyberArk Products by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on CyberArk Products