• KuppingerCole: Leadership Compass Privilege Management – 2014

    This Leadership Compass provides an overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management. Technologies typically support Privilege Management as a password repository approach (commonly called “vault”), with some form of proxy/gateway to …

  • On-Demand Privileges Manager™ for Windows Datasheet

    Dramatically reduce costs by implementing ‘least privilege’ policies on desktops and servers.

  • NIST SP 800-53 Revision 4: Implementing Essential Security Controls with CyberArk® Solutions

    Federal agencies are required by law to comply with the Federal Information Security Management Act (FISMA), which references the NIST SP 800-53 Recommendations. The long-awaited Revision 4 represents the first major review of the Recommendations in almost four years. These …

  • Secure Your Cloud and Outsourced Business with Privileged Account Security

    Privilege is everywhere. Outsourcing, from traditional managed and hosted services to the cloud, extends the complex relationships of privileged accounts, users, data, systems and services, which are so critical to assessing and reducing corporate risk, well beyond enterprise boundaries. Understanding …

  • The 10 Pains of Unix Security

    This whitepaper presents the security pains prevalent in Unix environments and offers some advice on what requirements to look for when evaluating solutions for these pains.