
In today’s threat landscape, the identity attack surface is expanding at an unprecedented rate. Recent high-profile breaches have demonstrated how cybercriminals exploit any type of identity or account to gain an initial foothold within the corporate environment. Organizations with hybrid, multi-cloud infrastructures or those navigating mergers, acquisitions, and broader digital business transformations are especially vulnerable to misconfigured identity systems and poor identity hygiene.
To address these critical business challenges, Hydden is now partnering with CyberArk to provide the visibility and actionable intelligence needed to mitigate risks and protect critical assets. Hydden continuously monitors identity risks across on-premises and cloud systems, surfacing poor security hygiene, exposed credentials, excessive privileges, dormant accounts, and risky access patterns that attackers exploit. By feeding this intelligence into CyberArk’s PAM and IGA solutions, organizations can bring previously unknown identities under control and harden access without slowing the business down.
The power of Hydden’s integration
Most enterprises do not struggle with a lack of identity tools; they struggle because their identities are scattered across systems that do not talk to each other. HR platforms, IdPs, AD/Entra, local user stores, and device directories all hold pieces of the truth, but no single system sees every account. Hydden connects to these hard-to-reach systems, reconciles fragmented identity data, and continuously monitors risk. With Hydden’s identity data, CyberArk customers can govern and manage previously unknown human and machine identities, extending least privilege and strong controls to accounts that were never in scope before:
- PAM coverage that reaches the long tail
- Discover privileged human and machine accounts across legacy/custom apps, databases, endpoints, devices, and SaaS.
- Auto add unmanaged credentials (passwords, SSH keys, certs, tokens) into CyberArk EPV/Privilege Cloud Safes for rotation and policy enforcement.
- Feed CyberArk with ownership and hygiene context (shared accounts, stale credentials, MFA gaps) to prioritize security hardening at scale and ensure accounts are configured appropriately for JIT and least privilege policies.
- IGA that runs on complete and accurate truth
- Bring identities from non-standard systems into CyberArk Identity Governance campaigns without custom scripting.
- Apply continuous parity checks between source apps and IGA (deltas, duplicates, drift) so reviews run on complete, accurate, current data.
- Reduce manual reconciliations and reviewer fatigue with enriched, easy to understand context and automatically assigning human owners to machine accounts.
- Continuous identity data assurance
- Detect field/format/API changes at the source and adjust collection automatically.
- Reduce manual interventions from app owners and engineers to maintain custom connections.
- Maintain immutable snapshots for dated proof to provide audit-ready evidence on demand.
Advancing visibility for identity security
“Modern approaches to identity security require deep collaboration and more connective tissue between vendors,” said Jai Dargan, CEO and Co-founder of Hydden. “Since day one our vision has been to deliver CISOs and security teams with an end-to-end and real-time visibility layer of their identity attack surface, as visibility is essential to ensuring the effectiveness of existing security controls, like PAM. Our partnership with CyberArk is a testament to that vision — and we are excited to deliver customers with a turn-key experience that provides immediate risk reduction through end-to-end visibility.”
“Continuous discovery of all identities across IT infrastructure is key to cyber defense and resiliency,” said Tom Lahive, VP of Partner Marketing at CyberArk. “We are excited to build on the power of CyberArk’s Identity Security platform through our partnership and integration with the Hydden platform. The growing Identity Attack Surface is a serious cybersecurity challenge that requires end-to-end visibility and continuous security controls and our partnership with Hydden helps address these challenges.”
Addressing critical business challenges
Hybrid environments, digital transformations, and ongoing M&A activity create exactly the kind of identity sprawl attackers look for: misaligned sources of truth, misconfigured accounts, and weak hygiene. Hydden’s integration with CyberArk closes those gaps by connecting to hard-to-reach systems, vaulting every privileged identity, and feeding CyberArk with clean, actionable intelligence. The result is stronger protection of critical assets and more value from existing CyberArk investments.
For CyberArk PAM (EPV / Privilege Cloud / Endpoint Privilege)
- Total privileged coverage: Discover and classify accounts beyond AD, from legacy/custom apps, databases, endpoints, devices, and SaaS.
- Auto vault onboarding: Automatically add newly discovered credentials directly to CyberArk Safes for rotation and control.
- Risk informed hardening & JIT: Surface hygiene gaps (stale creds, shadow admins, shared accounts, MFA gaps) to optimize JIT policies and ultimately ensure a smooth user experience when these accounts are utilized.
- Endpoint least privilege at scale: Identify local admin accounts on Windows, Mac, and Linux endpoints and bring them under CyberArk management.
For CyberArk Modern Identity Governance
- Broader, cleaner review scope: Onboard non-standard systems without custom scripting; enrich with ownership, usage, and hygiene context.
- Continuous data integrity: Source app and IGA parity checks ensure decisions are made on verified data.
- Operational efficiency: Fewer exceptions and faster campaigns with automated exception handling and dated, auditor-ready evidence.
This partnership delivers measurable outcomes that help CyberArk customers realize more value from their existing investments:
- Coverage: Discover and vault every privileged human and machine account
- Assurance: Governance decisions based on complete, accurate, verified identity data.
- Efficiency: Shorter access campaigns, fewer exceptions, less manual work.
- Compliance: Point in time evidence and defensible audits.
About Hydden
Hydden is a leader in identity data analysis, delivering comprehensive visibility and actionable insights to help organizations secure their most critical assets. With the discovery, observability and control platform, Hydden empowers organizations to reduce risk, accelerate compliance, and achieve faster ROI on PAM and IGA implementations. To learn more about Hydden, visit https://www.hydden.com.
Niels van Bennekom is Manager of Tech Alliances Product Management at CyberArk.
Steven Goldberg is the Head of Product Marketing at Hydden





















