Secure Application Credentials
-
Building a Business Case for Centralized Secrets Management
In this whitepaper, you’ll learn how to make the case to leadership for how centralized secrets management can help your company secure all the application secrets across your enterprise.
-
You’ve Got Privileged Access Management… But Can You Keep Secrets Secure?
Threat actors don’t often need to execute the latest zero-day exploit or fight through firewalls to launch their attacks. Instead, they simply walk through the front door with stolen user...
-
Gartner Names CyberArk a Leader in the 2021 Magic Quadrant for PAM
Download Now -
2:30
5 Stages of Securing Application Secrets Using the CyberArk Blueprint
Learn how to use the CyberArk Blueprint to secure application secrets across your enterprise.
-
Hide Your Stash of Application Secrets From Attackers
Secrets are everywhere, across a wide variety of application types. Is this buried treasure safe from potential attackers? Or are your secrets scattered across islands of security?
-
45:47
Lessons Learned From Okta: A Security-first Approach to Mitigating Identity Provider Risk
Okta Compromise: CyberArk’s Perspective on the Fallout and Lessons Learned
-
How CyberArk Customers Secure Their Application Secrets Across the Enterprises
Learn how current customers have used CyberArk Secrets Manager to secure DevOps tools, CI/CD pipelines, robotic process automation (RPA) and other application types.
-
IDC InfoBrief: Managing Application Secrets Across the Enterprise
Discover secrets management insights and approaches from leading enterprises in this InfoBrief from IDC.
-
Are All Your Application Secrets Secure Across Your Enterprise
As the number of applications grows, security teams must expand their PAM programs to secure all application secrets — without slowing down development teams.
-
4:38
Executive Perspective: Securing All Application Secrets Across the Enterprise
Hear from Kurt Sand, general manager of DevSecOps, on his perspective regarding securing application secrets across the enterprise.
-
5:05
The Drawing Board: Secure Application Secrets
Securing secrets used by applications across the enterprise has never been more important. Watch this video to discover how to address the challenges in securing credentials across applications.
-
Workforce Trends to Watch in 2022: What Attackers Want from Collaboration Apps
In a pandemic-altered business world, one of the most striking developments that’s still unfolding is the global movement of workers rethinking what matters most — in work, life and everywhere in...
-
CyberArk + Ekata Customer Identity Verification Plus Identity Security
Identity Verification to support Customer Identity and Access Management
-
CyberArk Identity Workforce Password Management
The Workforce Password Management capability enables companies to securely store and manage password-based credentials in CyberArk Cloud or optionally self-hosted CyberArk Vault.
-
A Blueprint for Securing All Application Secrets Everywhere
This eBook outlines a practical approach and blueprint for enterprises to secure their entire application portfolio. It addresses applications of all types from zOS and COTS, to Kubernetes.
-
Breaking Down the Codecov Attack: Finding a Malicious Needle in a Code Haystack
Earlier this month, San Francisco-based technology company Codecov discovered that attackers had compromised its software platform — used by more than 29,000 customers worldwide to test software...
-
Codecov Breach Learning: Engage Developers to Protect the DevOps Pipeline
Regardless of what industry you’re in, software is a driving force behind digital innovation. But what happens when the software your organization builds and uses to innovate isn’t secure? It’s a...
-
It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground
Today is Identity Management Day – a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). In the midst of a dramatic...
-
Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk
If you’ve never celebrated the Epiphany (or Mardi Gras in Louisiana), you have likely missed out on the tradition of the King Cake. It’s a coffee cake-type pastry with a small figurine baked...
-
Applications Are Everything and Everywhere – Does Whack-a-Mole Security Work?
The SolarWinds digital supply chain attack began by compromising the “heart” of the CI/CD pipeline and successfully changing application code. It highlighted the major challenges organizations...
-
CyberArk Secrets Manager
CyberArk Secrets Manager secures secrets and credentials used by the broadest range of applications in hybrid, cloud-native and containerized environments.
-
Loading More...