The key features and functionalities of CyberArk that the surveyed company uses:
- Uses CyberArk for the following:
- Securing privileged credentials in a vault
- Rotating credentials based on policies
- Securing and rotating shared service accounts
- Monitoring and recording privileged sessions
- Securing credentials used by applications
- Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
- Domain admin accounts
- Microsoft Windows admin accounts
- NIX admin accounts (UNIX and Linux)
- Network device accounts
- Database or application admin accounts
- Cloud admin consoles for IaaS or PaaS (Amazon Web Services, Microsoft Azure, Google Cloud, OpenShift, Pivotal Cloud Foundry)
- SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
- Local admin accounts on workstations
- Application credentials
- Secrets used by DevOps tools
- Service accounts
- SSH keys
- Robotic process automations
- Plans to integrate the following tools with CyberArk within the next 18 months:
- Authentication (DUO or OKTA, RSA)
- The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
- DevOps (Docker, Chef, Puppet)
- Discovery (ForeScout, BMC)
- Identity and access (Sailpoint, RSA)
- Orchestration and threat response (ServiceNow, ProofPoint)
- SIEM (Splunk, Fortinet, LogRhythm)
- Vulnerability management (Qualys, Rapid7, Tenable)
“The PAS (Privileged Access Security) solution CyberArk offers has a wide variety of use cases that are readily apparent, and there are plenty of creative ways to apply use cases that are out of the norm with the tool. In my opinion, the PAS solution covers all aspects of privileged account management, and the only shortfall with it is the reporting/dashboarding end directly within the platform. Although if Splunk is available the data that CyberArk pushes to Splunk is more than adequate to create the needed dashboards.”