CyberArk | Security for the Heart of the Enterprise

Why CyberArk

CyberArk is the trusted leader in Privileged Account Security, with more than half of the Fortune 100 companies relying on our solutions to protect their most critical and high-value assets


Think like an attacker

Attackers spend an average of 99 days inside your systems undetected.


Unsecured privileged accounts giving them access to your highest value assets and data.

With the most complete solution in the industry, only CyberArk protects your enterprise from the ever-expanding attack surface by locking down your privilege accounts wherever they live: on-premise, in the cloud or in hybrid environments.

CyberArk In The News



The CyberArk Blog
Threat Research Blog

Four Critical Steps for Securing API Keys in Your Organization’s Cloud Workloads

Automation enables organizations to leverage the dynamic capabilities of the cloud. Today, enterprises are increasingly leveraging automation tools and DevOps initiatives to drive greater business agility, improve efficiency and optimize business processes. To achieve this agility securely, automation tools pass credentials through APIs to ensure that only authenticated automation tools, applications, etc. can access the […]

The Whys and Wherefores of Automating Privileged Tasks

A task can be defined as: noun 1.  A piece of work that needs to be done regularly. verb  2.  Assign a piece of work to. IT operations teams are often inundated with menial, regular and repetitive tasks (e.g. trigger events, running daily monitoring activities and starting services) that can not only be damaging to […]

Introducing CyberArk Conjur Open Source Secrets Management Solution

“Don’t underestimate the power of your vision to change the world. Whether that world is your office, your community, an industry or a global movement, you need to have a core belief that what you contribute can fundamentally change the paradigm or way of thinking about problems.”–  Leroy Hood Today, I am excited to announce […]

Implementing Malware Command and Control Using Major CDNs and High-Traffic Domains

In this blog post, we will present a new technique for domain fronting, which enables attackers to abuse Content Delivery Networks (CDNs) to mask malware command and control (C2) traffic. This research demonstrates a new technique for hiding a C2 channel completely within a CDN. While many CDNs are potentially impacted, Akamai is one of […]

Red Team Insights on HTTPS Domain Fronting Google Hosts Using Cobalt Strike

In this blog post, we will cover HTTPS domain fronting Google hosts (,, etc.) using Cobalt Strike. Domain fronting via has been used by adversaries, and it is valuable to include as part of Red Team assessments. Domain Fronting is a technique to hide the remote endpoint of communication while leveraging high reputation […]

GhostHook – Bypassing PatchGuard with Processor Trace Based Hooking

In this article, we’ll present a new hooking technique that we have found during our research work. Hooking techniques give you the control over the way an operating system or a piece of software behaves. Some of the software that utilizes hooks include: application security solutions, system utilities, tools for programming (e.g. interception, debugging, extending […]


Webinar Series: On The Front Lines

01/10/2017 - 04/10/2017

FS-ISAC Fall Summit

10/10/2017 - 12/10/2017






Don’t go it alone

CyberArk has created an expansive partner ecosystem of technology vendors, solutions integrations and channel partners to help your organization tackle the most complex security challenges






C3 Alliance Global Technology Partner Program: Building on the power of privileged account security to better protect customers from cyber threats.

Learn More


CyberArk has built an enviable channel partner community to help customers around the world secure and manage their privileged accounts.

Learn More

Stay one step ahead

Up your security IQ by checking out our collection of curated resources including ebooks, webinars and videos covering a wide-range of security topics


More Resources