CyberArk Defines Maturity Model to Securing Privileged Accounts

Best Practices Guide Breaks Down the Process of Locking Down the Most Coveted Asset in Advanced and Insider Attacks

Newton, Mass. – April 22, 2014  CyberArk, the company securing the heart of the enterprise, today released a maturity model to securing privileged accounts, titled The Three Phases of Securing Privileged Accounts: A Best Practices Guide. This guide will enable organizations to wrap their arms around how to prevent exploitation of this critical security layer by providing a simple, yet effective, framework for applying the best security strategy for any environment.

Privileged accounts are exploited every day, highlighted by the data leaks by NSA systems administrator Edward Snowden and the recent U.S. tax return crime wave, yet smaller-scale attacks occur daily. The cost of doing nothing to protect these accounts is routinely displayed in the stream of reports detailing compromise after compromise effecting businesses across the globe. Correspondingly, security frameworks such as the Council on Cyber Security Top 20 Critical Security Controls and NIST have always maintained the importance of protecting, managing and monitoring privileged accounts, however, there remains much confusion over how to manage this critical security layer.

“The role of privileged access in headline-grabbing security breaches is undeniable and has pushed the management of these accounts to the top of every CISO’s priority list, yet few understand how to address the problem beyond compliance mandates,” said John Worrall, chief marketing officer, CyberArk. “This guide will serve as a starting point for the many organizations left wondering, ‘What are privileged accounts?’ ‘Where do they exist on my organization?’ ‘How do I protect them?’ ‘How do I manage these accounts moving forward?’”

In this new paper, CyberArk simplifies the process of identifying, securing and managing these powerful accounts for organizations, detailing key phases of privileged account security, including:

  • Defining a Privileged Account:  These accounts exist in many forms across an organization – employee accounts, hard-coded into applications, in every technology connected to a network and even industrial control systems – in typical volumes of double or triple the number of employees.  Each poses significant security risks if not protected, managed and monitored. Understanding what these accounts are and where they exist is the first step towards closing a critical security gap.
  • Best Practice Maturity Model: Each organization’s environment and needs are different, and determining the most effective approach to secure privileged accounts requires a blend of process changes, policy and technology. The practice of securing privileged accounts should be on-going with continuous evaluation to improve security. This maturity model lays out best practices for baseline, medium and highly effective security, addressing the process changes as well as the tools and solutions necessary to continuously protect and monitor privileged accounts.

The Three Phases of Securing Privileged Accounts: A Best Practices Guide is available for download today, please visit http://www.cyberark.com/contact/white-paper-securing-privileged-accounts-best-practices-guide

About CyberArk
CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 45 percent of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout EMEA and Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.

###