{"id":32225,"date":"2017-06-22T08:25:06","date_gmt":"2017-06-22T12:25:06","guid":{"rendered":"https:\/\/www.cyberark.com\/session-isolation-and-access-control\/"},"modified":"2020-04-23T16:48:31","modified_gmt":"2020-04-23T20:48:31","slug":"session-isolation-and-access-control","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/solutions\/session-isolation-and-access-control\/","title":{"rendered":"Session Isolation and Access Control"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;middle&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;SESSION ISOLATION AND ACCESS CONTROL&#8220; font_container=&#8220;tag:h1|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8220;.vc_custom_1538590649071{padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8220;][vc_column_text]<\/p>\n<h4>Isolate privileged user sessions to protect critical systems<\/h4>\n<p>Privileged users have direct access to critical systems for legitimate business purposes. But what happens if those users become compromised? Privileged users \u2013 both on the inside and at remote vendors \u2013 are constantly targeted by determined attackers, and it only takes one successful phishing email to grant attackers direct access to critical systems. An infected laptop could easily spread malware to critical IT infrastructure, and keylogging software could be used to capture privileged account credentials, thus giving attackers the keys to the kingdom. In addition, malicious insiders with direct knowledge of privileged credentials can use those credentials to gain direct, uncontrolled access to critical systems to carry out an attack. In this threat landscape, organizations need a way to enable the administrative access needed for business purposes without putting critical systems at increased risk of compromise.<\/p>\n<p>CyberArk solutions enable organizations isolate privileged user sessions and enforce strong access controls to protect critical systems from malicious users and devices. By physically separating user endpoints from critical target systems via a secure, hardened jump server, organizations can ensure that malware on an infected user device is unable to reach critical systems. The secure jump server also establish a single point of access control, from which organizations can grant privileged access without ever exposing privileged credentials to users or their machines. As a result, CyberArk solutions are able to prevent malicious users from hijacking privileged credentials, bypassing the secure jump server and gaining direct access to critical systems.<\/p>\n<p>Key Benefits:<\/p>\n<ul>\n<li>Prevent malware on infected endpoints from spreading to critical systems<\/li>\n<li>Prevent attackers from stealing privileged credentials even if keylogging malware is installed on user endpoints<\/li>\n<li>Establish a single point of control that users must access before authenticating to privileged accounts on critical systems<\/li>\n<li>Prevent users from bypassing controls and gaining direct access to critical systems<\/li>\n<li>Enable session controls, including the ability to terminate suspicious sessions, from a centralized privileged access control point<\/li>\n<li>Support the vast majority of critical systems within the enterprise to ensure the broadest protection of critical systems<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;middle&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;SESSION ISOLATION AND ACCESS CONTROL&#8220; font_container=&#8220;tag:h1|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8220;.vc_custom_1538590649071{padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8220;][vc_column_text] Isolate privileged user sessions to protect critical&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":32302,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-32225","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Session Isolation and Access Control | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Session Isolation and Access Control\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;middle&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;SESSION ISOLATION AND ACCESS CONTROL&#8220; font_container=&#8220;tag:h1|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8220;.vc_custom_1538590649071{padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8220;][vc_column_text] Isolate privileged user sessions to protect critical...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-23T20:48:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/\",\"url\":\"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/\",\"name\":\"Session Isolation and Access Control | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2017-06-22T12:25:06+00:00\",\"dateModified\":\"2020-04-23T20:48:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u00f6sungen f\u00fcr Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Session Isolation and Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Session Isolation and Access Control | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/","og_locale":"de_DE","og_type":"article","og_title":"Session Isolation and Access Control","og_description":"[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;middle&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;SESSION ISOLATION AND ACCESS CONTROL&#8220; font_container=&#8220;tag:h1|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8220;.vc_custom_1538590649071{padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8220;][vc_column_text] Isolate privileged user sessions to protect critical...","og_url":"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-04-23T20:48:31+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/","url":"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/","name":"Session Isolation and Access Control | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2017-06-22T12:25:06+00:00","dateModified":"2020-04-23T20:48:31+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/de\/solutions\/by-project__trashed\/session-isolation-and-access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"L\u00f6sungen f\u00fcr Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Session Isolation and Access Control"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=32225"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32225\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32302"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=32225"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=32225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}