Securing and Managing Privileged Credentials Used by Commercial Off-the-Shelf (COTS) Applications

December 17, 2019

To keep privileged credentials used by COTS applications protected and to reduce the risk of credential misuse, organizations must secure and manage them as any other type of privileged credentials used by individuals. CyberArk Application Identity Manager can be used to eliminate embedded privileged credentials (passwords and SSH keys) used by COTS applications from within application scripts, configuration files and software codes. Credentials are securely stored in the CyberArk Digital Vault and automatically rotated. With CyberArk Application Identity Manager seamlessly integrated out-of-the-box with COTS applications, organizations are able to reduce the risk of unauthorized application credential use and simplify credential management, while still maintaining the performance requirements of mission-critical applications.

Previous Article
Privilege Cloud Jump Start Solution Brief
Privilege Cloud Jump Start Solution Brief

The Privilege Cloud Jump Start is a three phased approach to help organizations plan, deploy and scale Priv...

Next Article
Privileged Access Management as a Service: Why It Matters
Privileged Access Management as a Service: Why It Matters

Privileged access is the gateway to an organization’s most valuable assets. Nearly all advanced cyber-attac...