CyberArk Delivers Key Privileged Access Controls for ISO/IEC Standards for Information Security
New Whitepaper Guides Organizations to Address ISO/IEC 27002 Security Controls with the CyberArk Solution
Newton, Mass. – December 2, 2014 – CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, has released a new white paper, “Safeguarding Privileged Access: Implementing ISO/IEC 27002 Security Controls with the CyberArk Solution.” The technical paper provides organizations with a blueprint for implementing the CyberArk Privileged Account Security to enforce controls pertaining to privileged access within the ISO/IEC 27002:2013 standard.
Privileged accounts, which consist of IT administrative credentials, default and hardcoded passwords, application backdoors and more, are targeted in nearly every significant cyber attack.  In response, organizations are increasingly adopting best practices standards for securing these accounts, including the International Organization for Standardization (ISO) and the International Electotechnical Commission (IEC) 27002 standard. The standards highlight the critical nature of privileged account abuse as part of advanced attacks, warning that “the inappropriate use of system administrator privileges…is a major contributory factor to failures or breaches of systems.”
“Privileged accounts represent a serious vulnerability,” said John Worrall, CMO, CyberArk. “Organizations adhering to ISO/IEC guidelines for safeguarding privileged access are taking a huge step forward in mitigating advanced attacks. The new whitepaper outlines how CyberArk helps organizations implement the controls outlined in the ISO/IEC standards.”
The CyberArk Privileged Account Security Solution helps organizations implement the following controls, which are consistent with the ISO/IEC 27002:2013 standard’s focus on privileged access security:
- Establishing and implementing privileged access policy
- Identifying the privileged access rights associated with each system or process
- Restricting the use of privileged access to authorized users based on functional roles
- Authenticating privileged users, ensuring individual accountability for privileged actions
- Changing default vendor passwords
- Restricting access to privileged utility programs
- Controlling privileged access by suppliers
CyberArk will host two 30-minute webinars titled, “Do your privileged accounts meet ISO/IEC 27002 standards,” outlining how to best protect privileged accounts to address the new controls. To register, please visit:
- December 9, 2014 @ 2:00 p.m. GMT
- December 16, 2014 @ 2:00 p.m. ET
To download the whitepaper, “Safeguarding Privileged Access: Implementing ISO/IEC 27002 Security Controls with the CyberArk Solution,” please visit https://www.cyberark.com/resource/safeguarding-privileged-access
CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including more than 35 percent of the Fortune 100 and 17 of the world’s top 20 banks – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA. The company also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit cyberarkvx.staging.wpengine.com, read the company blog, https://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.
This release may contain forward-looking statements, which express the current beliefs and expectations of our management. Such statements involve a number of known and unknown risks and uncertainties that could cause our future results, performance or achievements to differ significantly from the results, performance or achievements expressed or implied by such forward-looking statements. Important factors that could cause or contribute to such differences include risks relating to: changes in the new and rapidly evolving cyber threat landscape; our failure to effectively manage our growth; fluctuations in our quarterly results of operations; real or perceived shortcomings, defects or vulnerabilities in our solution or the failure of our solution to meet customers’ needs; our inability to acquire new customers or sell additional products and services to existing customers; competition from IT security vendors and other factors discussed under the heading “Risk Factors” in the final prospectus for our initial public offering filed with the Securities and Exchange Commission on September 24, 2014. Forward-looking statements in this release are made pursuant to the safe harbor provisions contained in the Private Securities Litigation Reform Act of 1995. These forward-looking statements are made only as of the date hereof, and we undertake no obligation to update or revise the forward-looking statements, whether as a result of new information, future events or otherwise.
# # #
Copyright © 2014 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.
 CyberSheath, “APT Privileged Account Exploitation,” 2013
 ISO/IEC 27002:2013 Page 22