IDC Technology Spotlight: Key Considerations for Securing Privilege on the Endpoint - CyberArk