The CISO View - Protecting Privileged Access in Robotic Process Automation

April 7, 2020

From a business perspective, Robotic Process Automation (RPA) promises to be a fast route to increased efficiency, productivity, and quality. Organizations are rapidly adopting RPA to automate business processes, from finance and HR to manufacturing and customer service. From a cybersecurity perspective, RPA also brings a new and attractive attack surface, with a prime concern being the proliferation of privileged access. Robots—and by extension the humans who control them—are often given broad access to a variety of highly sensitive business applications. Read this white paper to get the unique perspective of industry leading CISO’s, who provide their key findings and recommendations for a successful RPA deployment.

Previous Article
Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) Phase 2 Privilege Management Requirements
Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) Phase 2 Privilege Management Requirements

Learn the role PAM plays for federal government agencies and how it aligns to the recommendations of the Co...

Next Article
Penetrating Kubernetes 101
Penetrating Kubernetes 101

This this detailed whitepaper covers the security research the CyberArk Labs performed on Kubernetes and be...