CyberArk Advances Identity Security Market with Unmatched Cybersecurity Innovation
CyberArk has announced significant advancements in its Identity Security platform at the CyberArk Impact 2022 event in Boston. The updates focus on enhancing privileged access management, identity management, and cloud privilege security to support organizations in countering increasing cybersecurity threats. Key features include Identity Flows for automated tasks, Secure Cloud Access for Just-in-Time access, and a new Identity Security Intelligence service for threat detection. The platform aims to provide secure access for all identities, ultimately driving cyber resilience.
- Announced advancements in Identity Security platform aimed at enhancing cybersecurity solutions.
- New features like Identity Flows and Secure Cloud Access designed to automate and secure identity management.
- Introduction of Identity Security Intelligence for continuous threat detection and protection.
- None.
Identity Security Centered on Intelligent Privilege Controls Offers Customers a
Organizations continue to play a difficult balancing game. They must manage down cybersecurity debt brought on by rapid moves to the cloud and SaaS adoption, which create a surge in identities, while bolstering defenses to brace for coming waves of attacker sophistication and new, unrelenting attack volume – often in the form of ransomware and the exploitation of software supply chain weaknesses. Today, for every human identity there are 45 machine identities and over half of an organization’s workforce has access to sensitive corporate data. These human and machine identities represent an expanded attack surface that adds pressure to mounting cybersecurity insurance and compliance requirements.
These challenges call for advanced Identity Security solutions architected for the evolving threat landscape with the ability to enforce least privilege. Centered on intelligent privilege controls, Identity Security seamlessly secures access for all identities, and flexibly automates the identity lifecycle, with continuous threat detection and protection – all with a unified approach.
“Two years ago at our
Advancing Business Critical Identity Security
Built for the dynamic enterprise, the
Identity Management
-
CyberArk Identity Flows automates identity management tasks through no-code / low-code app integrations and workflows for identity data, processes and events. With Identity Flows, users can take actions and make decisions from a single location, improving productivity and user experience. Identity Flows is built on technology from the acquisition of Aapi.io.CyberArk acquired Aapi.io inMarch 2022 to bolster Identity Lifecycle Management capabilities and broaden Identity Automation and Orchestration capabilities across its Identity Security Platform. -
CyberArk Identity Compliance makes it easier for organizations to enforce and demonstrate compliance by automating the access provisioning lifecycle, streamlining access certifications and providing comprehensive identity analytics. Leveraging leading identity lifecycle and privilege entitlements management features, the Identity Compliance solution can help organizations strengthen their security posture, enforce least privilege and comply with a growing number of regulatory requirements.
Cloud Privilege Security
-
CyberArk Secure Cloud Access provisions Just-in-Time, least privilege access to cloud consoles, command lines and services, helping implementZero Trust initiatives by reducing the risk of compromised privileged sessions for DevOps and cloud operations teams. With Secure Cloud Access, privileged sessions are provisioned with only the required permissions for the task at hand, protected from browser hijacking, and recorded to help satisfy audit and compliance. OnlyCyberArk helps secure both standing and Just-in-Time access across hybrid and multi-cloud environments, enabling secure digital transformation initiatives.
Secrets Management
-
CyberArk Secrets Hub makes it easier for developers in hybrid environments to consume secrets onAmazon Web Services (AWS) using AWS Secrets Manager, while security managers retain centralized control and the ability to enforce unified policies over secrets using existing processes and infrastructure (see “CyberArk Launches Secrets Hub for AWS Secrets Manager” for more details).
“The continued strong adoption of the
The
“Today’s announcements from
These latest
About
Copyright © 2022
View source version on businesswire.com: https://www.businesswire.com/news/home/20220713005105/en/
Media Contacts:
Email: press@cyberark.com
Highwire PR
Email: cyberark@highwirepr.com
Investor Relations:
Email: ir@cyberark.com
Source:
FAQ
What advancements did CyberArk announce at CyberArk Impact 2022?
How does CyberArk's new Identity Security Intelligence service work?
What is the significance of Identity Flows introduced by CyberArk?
When will the new advancements in CyberArk's Identity Security Platform be available?