How The Latest CyberArk Ecosystem Integrations Strengthen Identity Security for the Modern Enterprise

June 13, 2025 Niels van Bennekom

Product Insight

Over the past six months, CyberArk has continued to innovate and expand its ecosystem, delivering a host of new integrations designed to help organizations secure identities, secrets, and privileged access across increasingly complex environments. As the threat landscape evolves and digital transformation accelerates, seamless integrations are essential to help security teams maximize visibility, automate controls, and reduce risk without slowing down the business.

In this post, we’re excited to introduce the newest integrations across key categories, each designed to deliver enhanced security, operational efficiency, and flexibility for CyberArk customers.

Single Sign-On (SSO) and Workforce Identity integrations

SSO and Workforce Identity integrations are foundational for reducing friction and improving security posture. The latest addition, Transmit Security Identity Verification, enables organizations to strengthen workforce authentication with advanced identity verification capabilities. This integration helps ensure that only authorized users gain access, supporting compliance and reducing the risk of credential-based attacks.

Discovery: Uncovering Privileged Accounts and Identities Across the Cloud

As organizations increasingly adopt hybrid and multi-cloud environments, the number and complexity of human and machine identities—and their associated privileges—grow rapidly. This expansion makes it challenging for security teams to maintain visibility, enforce least privilege, and prevent excessive access. CyberArk’s latest integrations help organizations discover, assess, and secure privileged accounts and identities wherever they reside, reducing risk and improving operational efficiency.

  • The Wiz integration delivers deep visibility into cloud environments, helps organizations detect identities with excessive permissions and risky entitlements, and remediate them with CyberArk Secure Cloud Access.
  • Hydden Discovery streamlines the discovery and onboarding of privileged accounts across diverse IT environments.

Least Privilege Management: Enforcing Granular Access Controls

To minimize the attack surface and prevent lateral movement, organizations must enforce least privilege across all endpoints and applications. The latest CyberArk integration in this area helps organizations ensure that users only have the necessary access at the right time.

ServiceNow for EPM V2 is the newest version of the ServiceNow plugin with EPM, which now includes automatic approval based on an existing ticket, a new notification engine, and other capabilities.

Secrets Management: Protecting Sensitive Credentials

Secrets management is essential for securing application credentials, API keys, and other sensitive data—especially in DevOps and cloud-native environments. The latest CyberArk integrations in this space include:

These enhancements allow organizations to enforce consistent secrets management policies and reduce the risk of breaches stemming from exposed credentials.

Automation: Accelerating Security Operations

Automation is key to scaling security and identity-related services while reducing manual effort. The latest automation integration includes:

  • New Ansible Collection for CyberArk Identity Security Platform allows organizations to automate identity security workflows and privileged access management tasks across the CyberArk Identity Security Platform, similar to previous integrations. It streamlines provisioning, secrets management, and compliance enforcement, empowering DevOps and IT teams to embed security into their automation pipelines.

SIEM: Enhancing Visibility and Threat Detection

Security Information and Event Management (SIEM) integrations enable organizations to centralize security monitoring, correlate events, and accelerate incident response. The latest SIEM integrations include:

These integrations help organizations seamlessly ingest privileged access and identity-related events into leading SIEM platforms, providing security teams with the visibility needed to detect suspicious activity and respond swiftly.

CPM and PSM Plugins: Extending Privileged Access Controls

CyberArk’s Central Policy Manager (CPM) and Privileged Session Manager (PSM) plugins allow organizations to automate credential management and session monitoring for a wide range of systems:

PAM Self-Hosted HSM: Securing Cryptographic Keys

Hardware Security Modules (HSMs) are vital for protecting cryptographic keys used in privileged access management. The new integrations with Futurex Cryptohub and Procenne provide organizations with more options to secure their keys in self-hosted environments, supporting regulatory requirements and enhancing overall security.

Machine Identity: Automating and Securing Non-Human Identities

As machine identities proliferate across cloud, DevOps, and IoT environments, managing and securing them is increasingly complex. CyberArk’s latest machine identity integrations address this challenge across several layers:

Management Layer:

  • Symphony for SAP helps automate the management of machine identities in network and SAP environments, reducing risk and improving operational efficiency.

Certificate Authority/PKI

ALB/Traffic Management:

  • F5 BIG-IP SSLO: This integration simplifies the management of SSL/TLS certificates and keys for application traffic, supporting secure, high-performance application delivery.

Enhanced Threat Protection

CyberArk PAM Self-Hosted now integrates with Microsoft Defender for Identity, enhancing privileged access control, improved monitoring, and streamlined workflows. This integration provides a unified view of their identity security landscape, enabling faster threat hunting, more precise attack path identification, and comprehensive remediation options.

Conclusion: Building a More Secure, Integrated Future

CyberArk remains committed to delivering integrations that help organizations adapt to new threats, regulatory requirements, and technology shifts—without sacrificing agility or security. These new integrations span workforce identity, discovery, secrets management, SIEM, privileged access, HSM, and machine identity. They equip security teams to:

  • Gain comprehensive visibility across their environments
  • Automate and enforce security controls
  • Reduce manual overhead and operational complexity
  • Respond rapidly to emerging threats

As the identity security landscape continues to evolve, CyberArk remains focused on delivering the integrations and capabilities organizations need to protect what matters most. Stay tuned for more updates, and visit the CyberArk Marketplace to explore these new integrations in detail.

For more information on how these integrations can help your organization, reach out to your CyberArk representative or visit our product announcements page.

Niels van Bennekom is a manager of Tech Alliances Product Management, Corporate and Business Development at CyberArk.

Previous Article
Now on AWS Marketplace: CyberArk Enterprise Support for cert-manager
Now on AWS Marketplace: CyberArk Enterprise Support for cert-manager

Running Kubernetes on Amazon EKS? You’re likely already using cert-manager—the open source standard for TLS...

Next Article
Unified Security: Bridging the Gaps with a Defense-in-Depth Approach
Unified Security: Bridging the Gaps with a Defense-in-Depth Approach

The identity is the main attack vector for cybercriminals, with cybercriminals using stolen identity to inf...