Securing and Managing Privileged Credentials Used by Commercial Off-the-Shelf (COTS) Applications

December 17, 2019

To keep privileged credentials used by COTS applications protected and to reduce the risk of credential misuse, organizations must secure and manage them as any other type of privileged credentials used by individuals. CyberArk Application Identity Manager can be used to eliminate embedded privileged credentials (passwords and SSH keys) used by COTS applications from within application scripts, configuration files and software codes. Credentials are securely stored in the CyberArk Digital Vault and automatically rotated. With CyberArk Application Identity Manager seamlessly integrated out-of-the-box with COTS applications, organizations are able to reduce the risk of unauthorized application credential use and simplify credential management, while still maintaining the performance requirements of mission-critical applications.

Previous Article
NIST Guidelines for Secure Shell and What They Mean for Your Organization
NIST Guidelines for Secure Shell and What They Mean for Your Organization

Use CyberArk Privileged Access Security solutions to discover and manage SSH keys and audit SSH sessions in...

Next Article
The CISO View: Protecting Privileged Access in DevOps and Cloud Environments
The CISO View: Protecting Privileged Access in DevOps and Cloud Environments

This CISO View research report leverages the experiences of security leaders from the global 1000 to provid...