Session Management - Enhanced Security at Lower Cost

January 29, 2024 Lilach Faerman Koren

Session Management

CyberArk announces significant improvements to our session management capabilities. New, modern capabilities help CyberArk Privilege Cloud customers on the CyberArk Identity Security Platform improve the security and operational efficiency of session management by enabling access to a wider range of targets, improving user experience and reducing total cost of ownership (TCO) for CyberArk PAM programs.  

With this release, customers benefit from modernized session management and secure access to targets including databases, Windows, Linux and Kubernetes. Customers can now provision access with either vaulted credentials or just in time access with Zero Standing Privileges (ZSP), all with a quick installation of a light-weight connector.

Release Highlights

Deliver measurable risk reduction:

To enable access with vaulted credentials to infrastructure, customers use the existing access controls and user permissions from CyberArk Privilege Cloud on the CyberArk Identity Security Platform. 

Improve the operational efficiency of privileged session management: 

  • Up to sixteen times reduced footprint cost of session isolation with a light-weight connector. 
  • Reduced TCO, near-zero-downtime for upgrades and built-in high availability and load balancing.
  • Native, VPN-less access with IDP-based authentication to a wide range of targets and enforcing a variety of multi-factor authentication (MFA) methods, improving user experience.
  • Easier administration and authentication when accessing databases and Kubernetes with a new, purpose-built CLI tool and SDK - ArkCLI.
  • Added ZSP access to cloud VMs with fully-qualified domain name (FQDN).
  • Real time updates about the service and data center availability in the new Status Page

Complete Privileged Access Protection

Privileged Access Protection

To learn more about the modern session management capabilities with CyberArk PAM visit CyberArk documentation.

Previous Article
NIS2 Compliance : An Identity Security Guidebook
NIS2 Compliance : An Identity Security Guidebook

Learn about key NIS2 requirements for security controls and reporting, to help you comply with the EU’s dir...

Next Article
Endpoint Privilege: Why it Must be Managed and Secured
Endpoint Privilege: Why it Must be Managed and Secured

Learn about key differences between managing and securing endpoint privilege, while gaining insights on how...