• Fundamental Endpoint Security Best Practice: Securing Privilege on the Endpoint

    Information security professionals know there are two fundamental endpoint security practices that should be part of their security program in order to reduce the attack surface. Validated by various government information security organizations and industry analysts, the first practice is …

  • Introducing CyberArk Endpoint Privilege Manager

    Information security professionals recognize that cyber attackers will exploit endpoint vulnerabilities and then make a beeline for privileged credentials. As a result, organizations are evaluating how they can take steps to secure privilege on the endpoint as a fundamental part …

  • eBook: Achieving Security and Productivity with Least Privilege and Application Control

    The least privilege principle originated in the U.S. Department of Defense in the 1970s, and it was designed to reduce the potential damage of a security breach, whether accidental or malicious, by limiting access and user rights to the lowest levels possible. Giving employees what they need to access in order to do their work, but not more. Following this principle, many enterprises have removed local administrator rights from business users on endpoints as a proactive security measure.