New Research from Enterprise Strategy Group Determines New Privileged Account Security Model Necessary to Protect Against Advanced Cyber Threats

June 6, 2013

Analyst Jon Oltsik Recommends CyberArk’s Comprehensive Approach to Privileged Account Security; to Expand on Findings in Webinar and Twitter Q&A

NEWTON, Mass. – June 6, 2013 – Despite cyber-attackers increasingly targeting privileged accounts as part of their sophisticated enterprise assaults, organizations are still taking inefficient, tactical approaches to privileged account management that does little to prevent the escalation of APTs. This was the major finding in a new report from Senior Principal Analyst Jon OltsikofEnterprise Strategy Group (ESG), called “Advanced Cyber Threats Demand a New Privileged Account Security Model.”

In the new report, Oltsik concludes that organizations need to deploy a comprehensive privileged account strategy that centralizes management, monitoring and control of these powerful accounts in order to minimize the enterprise “attack surface.” Oltsik describes CyberArk as an example of an “end-to-end” solution for privileged/shared account protection, accountability, and intelligence. Oltsik will share the results of the new report in a Webinar, and through a public Twitter Q&A. The full report is available for download on CyberArk’s website.


Jon Oltsik, ESG


ESG’s “Advanced Cyber Threats Demand a New Privileged Account Security Model” report revealed that while “59 percent of enterprise organizations are certain or fairly certain they have been the target of an APT,” many continue to rely on marginal adjustments to privileged account security despite the increasing number of APTs linked to these accounts. According to Oltsik, “tactical changes don’t go far enough. Rather, CISOs need to think in terms of a privileged account security architecture offering central control, management, monitoring, and oversight of privileged accounts.” Oltsik will elaborate on his findings, and his recommendation of CyberArk’s Privileged Identity Management Suite, through a live webinar presentation and interactive Q&A session on Twitter.


Twitter Q&A: Wednesday, June 19, 2013, 3:00 – 3:30 p.m. ET (follow the hashtag: #PrivSec)

Webinar: Wednesday, July 17, 2013, 2:00 – 2:45 p.m. ET


To access Oltsik’s report, please visit:

To register for the webinar, please visit:

To participate in the Twitter Q&A, please log on to Twitter and follow CyberArkJon Oltsik and the conversation using the #PrivSec hashtag.