Documente Academic
Documente Profesional
Documente Cultură
REAL-TIME
THREAT Privileged Threat Analytics
DETECTION
Privileged
Enterprise Privileged Application On-Demand
PROACTIVE SSH Key
Threat
Password Session Identity Viewfinity Privileges
CONTROLS Manager
Vault®
Analytics Manager® Manager™ Manager™
CyberArk Digital Vault uses “safe” architecture to enable granular access controls.
Safes and Vault are protected with seven layers of security
Hierarchical
Encryption
Tamper-Proof
Auditability
Comprehensive
Monitoring
Session
Segregation of Duties
Encryption
Account Secure
Discovery Storage
Servers Mainframes
*****
Password Centralized
Rotation Policy Databases Applications
Network Security
CyberArk Web Portal Devices Appliances
Websites/ Cloud
Web Apps Infrastructure
Isolate Privileged Sessions: How does it work?
Digital Vault
Servers Mainframes
Passwords prevented
from reaching users
and devices
Databases Applications
Privileged Session
Manager
Malware blocked Network Security
on PSM to protect Devices Appliances
resources
Login via CyberArk Web Portal or
Native Unix Command Line
Collect
Detect
Identify suspicious activities and
behaviors
Alert
Notify security teams with detailed
incident information
Respond
Enable speedy response and
automated containment
Four Critical Steps to Stopping Advanced Threats