White Paper

IDC MarketScape: Worldwide Privileged Access Management 2014 Vendor Assessment

This IDC MarketScape: Worldwide Privileged Access Management 2014 Vendor Assessment (doc #253303, December 2014) assesses ten vendors offering products in the privileged access management (PAM) market and notes that, “CyberArk is the PAM pure-play ‘big gorilla’ with the most revenue …

White Paper

To sudo or not to sudo? That is the question

Organizations looking to enforce least privilege policies often begin by asking the question “to sudo or not to sudo?” Download this solution brief to weigh the benefits and drawbacks of sudo and to help you make more informed decisions about …

White Paper

Nucleus Research Guidebook: CyberArk Privileged Account Security Solution

Nucleus Research has released a Return On Investment (ROI) study identifying the CyberArk Privileged Account Security Solution as critical for protecting against advanced threats that exploit privileged accounts. The report goes further, and illustrates that customers can achieve complete payback …

White Paper

Addressing the Monetary Authority of Singapore (MAS) Technology Risk Management (TRM) Guidelines with CyberArk Solutions

Protecting privileged access is an essential part of addressing the MAS TRM guidelines. With the evolving threat landscape and growing complexities and reliance on IT systems in the financial sector, financial institutions must implement controls to secure their IT environment – not …

White Paper

Privileged Account Security in U.S. Federal Agencies

In April of 2014, the U.S. Department of Homeland Security published an RFI for Phase 2 of the Continuous Diagnostics and Mitigation (CDM) program focusing on Least Privilege and Infrastructure Integrity. CyberArk solutions address multiple requirements in Phase 2 of …

White Paper

Implementing ISO/IEC 27002 Security Controls with the CyberArk Solution

Many organizations globally use the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) 27002 standard as part of their information security program. The standard calls on organizations to pay particular attention to privileged user accounts, given their …

White Paper

Threat Report: Privileged Account Exploits Shift the Front Lines of Security

Cyber Threat Investigators Uncover Privileged Account Vulnerabilities in Most Serious Security Breaches CyberArk’s threat report provides an expert’s vantage point into targeted cyber attacks by tapping into the experiences of seasoned threat investigators at five firms renowned for detecting, analyzing …

White Paper

Discover the Keys to Securing SSH

SSH keys provide users and applications with privileged access to critical systems, but all too often these privileged credentials are left unsecured and unmanaged, leaving a gaping hole in any privileged account security strategy. To effectively protect the heart of …

White Paper

Securing Privileges in the Cloud

A Clear View of Challenges, Solutions and Business Benefits Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide to organizations of all sizes. Whether organizations are using private, public or hybrid cloud …

White Paper

KuppingerCole: CyberArk Privileged Threat Analytics

This executive view provides an overview of CyberArk’s Privileged Threat Analytics offering. CyberArk, a leading vendor in the PxM market, has released a major update to their behavioral analytics solution that specifically focuses on analyzing abnormal and potentially malicious use of privileged accounts. …

White Paper

Securing Privileged Accounts: Meeting the Payment Card Industry (PCI) Data Security Standard (DSS) 3.0 with CyberArk Solutions

Any organization involved in payment card processing is well-aware of their obligations to protect cardholder data in compliance with the Payment Card Industry Data Security Standard (PCI DSS). All entities that store, process or transmit cardholder data and/or sensitive authentication …

White Paper

Isolation, Control and Monitoring in Next Generation Jump Servers

Jump servers have emerged in recent years as a security best practice to create a separation between networks with different security requirements. Creating separation is strongly recommended to minimize the risk of a potential attacker accessing critical systems, but does …

White Paper

Enforcing the Australian Defence Signals Directorate (DSD)

In early 2013, the DSD updated its list of 35 mitigation strategies designed to help organisations reduce the risk of unauthorised access and minimise the exposure of sensitive information in case of a breach. Of the 35 mitigation strategies DSD …

White Paper

CyberArk’s Solutions for Virtualization Security

CyberArk is pioneering the Virtualization Security market with innovative solutions for managing and securing privileged access to the Hypervisor, isolating, controlling and recording privileged sessions on these machines. As the virtual environment grows at a fast pace, organizations are starting …

White Paper

Protecting Financial Information: Sarbanes-Oxley

Undoubtedly, The Public Company Accounting Reform and Investor Protection Act of 2002, also known as Sarbanes- Oxley Act (SOA), is having a major impact on corporate culture and various operational aspects of companies subject to SOA. SOA legislates a far …

White Paper

Websense Data Security Suite and CyberArk Inter-Business Vault®

The joint solution provides the following benefits for managing sensitive data throughout its lifecycle: Sensitive Data Discovery Highly Secure Sensitive Data Repository Data Leak Prevention for Data in Motion and Data in Use Conduct secure communications with business partners, customers …