TechValidate Research on CyberArk Products

CyberArk Case Study

Case Study: Medium Enterprise Financial Services Company


This case study of a medium enterprise financial services company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Management of privileged accounts, credentials, and secrets should be one of the core considerations of an overall security strategy as an attack will constantly try to compromise any type of credential to attempt to extract new credentials to move laterally throughout an environment. Although, if you’re using CyberArk and rotating your credentials at aggressive frequencies with a one-time password the risk is mitigated to stop attackers in their tracks.”


The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • IT admins not rotating privileged credentials in a timely fashion
    • Protecting assets running in the cloud
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Were driven by a board-level or executive mandate
    • Wanted to be better prepared for an audit
    • Failed an audit
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure infrastructure and assets in the cloud
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Securing credentials used by applications
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Network device accounts
    • Database or application admin accounts
    • Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Local admin accounts on workstations
    • Application credentials
    • Secrets used by DevOps tools
    • Service accounts
    • SSH keys
    • Robotic process automations
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • DevOps (Docker, Chef, Puppet)
    • Discovery (ForeScout, BMC)
    • Identity and access (Sailpoint, RSA)
    • Orchestration and threat response (ServiceNow, ProofPoint)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Vulnerability management (Qualys, Rapid7, Tenable)

“The PAS (Privileged Access Security) solution CyberArk offers has a wide variety of use cases that are readily apparent, and there are plenty of creative ways to apply use cases that are out of the norm with the tool. In my opinion, the PAS solution covers all aspects of privileged account management, and the only shortfall with it is the reporting/dashboarding end directly within the platform. Although if Splunk is available the data that CyberArk pushes to Splunk is more than adequate to create the needed dashboards.”


The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now significantly more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced a lot.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced dramatically.

About This Data

This data was sourced directly from verified users of CyberArk Products by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.

More Research on CyberArk Products