Session Management - Enhanced Security at Lower Cost

January 29, 2024 Lilach Faerman Koren

Session Management

CyberArk announces significant improvements to our session management capabilities. New, modern capabilities help CyberArk Privilege Cloud customers on the CyberArk Identity Security Platform improve the security and operational efficiency of session management by enabling access to a wider range of targets, improving user experience and reducing total cost of ownership (TCO) for CyberArk PAM programs.  

With this release, customers benefit from modernized session management and secure access to targets including databases, Windows, Linux and Kubernetes. Customers can now provision access with either vaulted credentials or just in time access with Zero Standing Privileges (ZSP), all with a quick installation of a light-weight connector.

Release Highlights

Deliver measurable risk reduction:

To enable access with vaulted credentials to infrastructure, customers use the existing access controls and user permissions from CyberArk Privilege Cloud on the CyberArk Identity Security Platform. 

Improve the operational efficiency of privileged session management: 

  • Up to sixteen times reduced footprint cost of session isolation with a light-weight connector. 
  • Reduced TCO, near-zero-downtime for upgrades and built-in high availability and load balancing.
  • Native, VPN-less access with IDP-based authentication to a wide range of targets and enforcing a variety of multi-factor authentication (MFA) methods, improving user experience.
  • Easier administration and authentication when accessing databases and Kubernetes with a new, purpose-built CLI tool and SDK - ArkCLI.
  • Added ZSP access to cloud VMs with fully-qualified domain name (FQDN).
  • Real time updates about the service and data center availability in the new Status Page

Complete Privileged Access Protection

Privileged Access Protection

To learn more about the modern session management capabilities with CyberArk PAM visit CyberArk documentation.

Previous Article
Why Machine Identities Are Essential Strands in Your Zero Trust Strategy
Why Machine Identities Are Essential Strands in Your Zero Trust Strategy

Just like a snagged strand can ruin your garment, overlooking the security of machine identities can tear t...

Next Video
Maximize Risk Reduction with an Identity Security Approach
Maximize Risk Reduction with an Identity Security Approach

Expert insights and strategies to help you implement security controls that cover all types of identities.