TechValidate Research on CyberArk Products

62 Case Studies – Page 3 of 3


CyberArk Case Study

Case Study: Large Enterprise Health Care Company

Introduction

This case study of a large enterprise health care company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“The process [of implementing CyberArk] is forcing service account discovery, ownership, usage, elimination of shared accounts, password rotation, strong passwords, and consolidation of repositories and activity logging.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • Balancing security with productivity
    • Rampant password reuse across multiple accounts
    • Securing credentials used by applications
    • IT admins having more privileges than they truly need
    • Unmanaged or unaudited third-party / remote vendor access
    • Too many endpoints with local administrator privileges
    • Protecting assets running in the cloud
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Were driven by a board-level or executive mandate
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Remove hard-coded credentials from applications and scripts, including applications built using DevOps methodologies
    • Secure third-party access
    • Secure privileges on endpoints
    • Secure infrastructure and assets in the cloud
    • Secure privileged accounts and credentials for non-IT users (Finance, HR, Marketing)

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Detecting and responding to attempts to circumvent privileged access controls
    • Securing credentials used by applications
    • Flagging and reviewing high-risk activity
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Database or application admin accounts
    • Local admin accounts on workstations
    • Application credentials
    • Secrets used by DevOps tools
    • Service accounts
    • SSH keys
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • Identity and access (Sailpoint, RSA)
    • SIEM (Splunk, Fortinet, LogRhythm)

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.

CyberArk Case Study

Case Study: Global 500 Insurance Company

Introduction

This case study of a Global 500 insurance company is based on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“CyberArk enabled us to adopt and develop a model for privileged access and configuration which was not possible before, resulting in an overall reduction in the number of accounts holding privileges.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select CyberArk:

  • Resolved the following challenges after using CyberArk:
    • IT admins having more privileges than they truly need
    • Control closure around privileged access management/insider threat mitigation
  • Adopted CyberArk’s privileged access security because of the following compelling business drivers:
    • Initiated a proactive security project
    • Were driven by a board-level or executive mandate
  • Selected a solution for privileged access security to:
    • Limit the exposure of privileged credentials
    • Enforce strong passwords, store them in an encrypted vault, and rotate them
    • Simplify audit and compliance requirements
    • Secure infrastructure and assets in the cloud

Use Case

The key features and functionalities of CyberArk that the surveyed company uses:

  • Uses CyberArk for the following:
    • Securing privileged credentials in a vault
    • Rotating credentials based on policies
    • Securing and rotating shared service accounts
    • Monitoring and recording privileged sessions
    • Detecting and responding to attempts to circumvent privileged access controls
    • Managing third-party / remote access
    • Flagging and reviewing high-risk activity
  • Managing the following types of privileged accounts, credentials, and secrets with CyberArk in the next 12 to 18 months:
    • Domain admin accounts
    • Microsoft Windows admin accounts
    • NIX admin accounts (UNIX and Linux)
    • Database or application admin accounts
    • SaaS accounts (Microsoft Office 365, Salesforce, Box, Concur)
    • Service accounts
  • Plans to integrate the following tools with CyberArk within the next 18 months:
    • Authentication (DUO or OKTA, RSA)
    • The cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
    • SIEM (Splunk, Fortinet, LogRhythm)
    • Assyst ticketing system

Results

The surveyed company achieved the following results with CyberArk:

  • Reports that since adopting CyberArk to manage their privileged accounts and credentials, they are now more secure.
  • Reports that since adopting CyberArk to secure their privileged accounts and credentials, the time and cost of audit reporting has reduced.
  • Reports that with CyberArk, the time required to manage and maintain privileged account and credential security has reduced.



More Research on CyberArk Products