Securing Privilege and Containing Attacks on the Endpoint - CyberArk