CYBERARK REMOTE ACCESS
Securely and Quickly Connect Third Party Vendors to CyberArk.
NO VPNS. NO AGENTS. NO PASSWORDS.
CyberArk Remote Access (formerly Alero™) combines Zero Trust access, biometric multi-factor authentication and just-in-time provisioning into one SaaS-based offering. Remote Access is designed to provide fast, easy and secure privileged access to 3rd party vendors who need access to critical internal systems via CyberArk, without the need to use passwords. By not requiring VPNs or agents Remote Access removes operational overhead for administrators, makes it easier and quicker to deploy and improves organizational security.
ENABLE SECURE THIRD PARTY VENDOR ACCESS TO CYBERARK
Remote Access is available for download on iOS and Android smart phones. It can be quickly and easily deployed for 3rd party vendors and contractors who need privileged access to critical systems managed by CyberArk Core Privileged Access Security or Privilege Cloud; for a full SaaS solution. For vendors who do not have smartphones, non-smartphone authentication is also available.
Full support of REST APIs enables automatic vendor provisioning and management. Via the REST APIs, bulk actions like inviting multiple remote users at once or deactivating and removing vendors automatically have never been easier.
WANT TO LEARN MORE?
The Remote Access Guided Tour is a 5-minute interactive demonstration to showcase how Remote Access ensures secure and quick access for 3rd party vendors accessing critical systems being managed by CyberArk.
Fast and secure access to CyberArk for 3rd party vendors.
Strike the perfect combination of strong security and ease of operation.
Enables a more secure solution for remote access to CyberArk Core PAS or Privilege Cloud than traditional token-based or VPN approaches.
Removes operational overhead associated with managing VPNs, agents and passwords. Simplifies the provisioning process for just-in-time access for remote vendors.
FOR REMOTE USERS
Provides a faster and easier way to access CyberArk. Enables cloud-based, biometric authentication without connecting external workstations to the network.
FAST FACTS ABOUT 3rd PARTY VENDOR ACCESS
In August 2019, CyberArk conducted a survey with IT and security decision makers from enterprise organizations to learn more about third party access and their current ability to reduce this risk. We found:
Of organizations rely on third party vendors to access critical internal systems.
Of organizations rank risk from third party access as one of their Top 10 security risks.
Of organizations felt they could do better, or were dissatisfied with their ability to secure third party access.
Ensure strong security and operational ease of use for 3rd party vendors who need access to CyberArk. No VPNs, agents or passwords needed.
Ensure that vendors are authenticated each time they need to access critical assets managed by CyberArk.
Providing third party vendors with sweeping access leaves organizations vulnerable and unable to verify for certain who is accessing what. Remote Access enforces Zero Trust access to the sensitive systems managed by CyberArk so that all interactions are verified and audited – without the need for VPNs, agents or passwords.
Simplify the provisioning of vendor access to CyberArk Core Privileged Access Security or Privilege Cloud.
Granting or maintaining unneeded standing access for users is a risky proposition for organizations. Remote Access allows 3rd party vendors to self-manage the onboarding process and provides secure and quick access to vendors – but, only for what they need, when they need it and for just the required amount of time. Remote Access also removes the need to deploy additional infrastructure or hardware in order to provide secure, granular access to critical internal systems and is built to scale rapidly if need be.
Utilize built-in smartphone capabilities to confirm vendor identities.
Using passwords or token-based authentication methods to verify the identities of vendors and contractors leaves the door open for attackers to masquerade as privileged insiders. Remote Access leverages cloud-based, biometric authentication via smart phones to connect authorized remote vendors to Remote Access also offers SMS and email based authentication for users without smartphones.
Gain full visibility into remote user access and get complete reporting, auditing and remediation capabilities for vendor activities.
Combining different security solutions to solve one problem often times leads to complicated processes and frustration for end users and administrators alike. Remote Access integrates with Core Privileged Access Security and/or Privilege Cloud, depending on how PAM is deployed. This out of the box integration adds an additional layer of security for 3rd party vendors who need to access critical internal systems. This integration provides risk-based audit and monitoring capabilities of sensitive systems accessed by vendors.