Newsroom

CyberArk Extends Endpoint Privilege Manager Capabilities to Support Linux Platforms

June 16, 2022

  • Enables users to protect Linux systems by applying and enforcing least privilege policies and just-in-time elevation
  • Latest update delivers a new, unified interface for protecting endpoints across Windows, Linux and Mac platforms

NEWTON, Mass. & PETACH TIKVA, Israel –– June 16, 2022CyberArk (NASDAQ: CYBR), the global leader in Identity Security, today announced new CyberArk Endpoint Privilege Manager functionality that extends protection to Linux platforms. Now, security and IT professionals can easily enforce least privilege and implement foundational just-in-time security controls across Linux endpoints in any environment.

Linux is widely applicable to various types of operations – everything from smartphones to cloud computing – and runs 90% of all public cloud workloads. In a recent survey, 83.1% of developers said Linux is the platform they prefer to work on. It’s so popular that in 2021, Linux ran on 100% of the world’s 500 supercomputers.

However, many Linux administrators find it challenging to enforce least privilege policies on DevOps engineers or application owners that access Linux servers while maintaining least privilege controls on Linux machines without creating friction for end users. CyberArk Endpoint Privilege Manager for Linux is a SaaS solution that provides simple and easy configuration and enforcement of least privilege policy. Linux administrators benefit from capabilities that enable them to quickly build the right policy rules for their users and reduce the manual work typically required to maintain these policies.

Endpoint Privilege Manager for Linux can monitor and automatically detect privileged activity. It      then helps administrators decide whether privileged access rights should be approved or blocked, and easily update the policy accordingly. Security teams and Linux administrators gain critical visibility and control over what users can run and execute on Linux systems. Additional capabilities include:

  • Standard sudo command syntax for smooth adoption
  • Sudo with password prompt or passwordless
  • Configurable policy audit reports for compliance and forensics
  • Rest APIs for policy automation and external system integration
  • Agent CLI for support and status monitoring
  • Upgrade or uninstall agents directly from the SaaS console

Endpoint Privilege Manager administrators can also now define and execute policies via a unified management console interface for protecting the organizations’ endpoints across Windows, Linux and Mac platforms.

“Endpoint privilege management solutions provide foundational security controls that are missing across a large number of organizations – opening them up to cybersecurity risk. These controls are especially important as businesses continue to prioritize digital transformation and mature and accelerate cloud adoption,” said Barak Feldman, senior vice president, CyberArk. “Endpoint Privilege Manager for Linux extends flexible, robust and scalable least privilege capabilities of the CyberArk Identity Security Platform over Linux endpoints – workstations and especially servers – while delivering just in time controls and automation that lift the manual burden on Linux administrators.”

Availability and Licensing

CyberArk Endpoint Privilege Manager for Linux is available now. Existing customers can leverage their existing Endpoint Privilege Manager SaaS tenants and expertise with no additional training or special licensing. For more details, visit: https://www.cyberark.com/products/endpoint-privilege-manager/

About CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn or Facebook.

Copyright © 2022 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.