Sunteți pe pagina 1din 9

Introducing CyberArk

CyberArk’s Privileged Account Security Solution

REAL-TIME
THREAT Privileged Threat Analytics
DETECTION

Privileged
Enterprise Privileged Application On-Demand
PROACTIVE SSH Key
Threat
Password Session Identity Viewfinity Privileges
CONTROLS Manager
Vault®
Analytics Manager® Manager™ Manager™

Web Management Interface

SHARED Master Policy


TECHNOLOGY
PLATFORM Discovery Engine

Secure Digital Vault™

PROTECT DETECT RESPOND


Privileged accounts stored in highly secure vault

CyberArk Digital Vault uses “safe” architecture to enable granular access controls.
Safes and Vault are protected with seven layers of security

Hierarchical
Encryption

Tamper-Proof
Auditability

Comprehensive
Monitoring

Session
Segregation of Duties
Encryption

Built-in Firewall Authentication


Proactive Protection: How does it work?

End Users Enterprise Password Vault Enterprise Resources

Account Secure
Discovery Storage
Servers Mainframes

*****

Password Centralized
Rotation Policy Databases Applications

Network Security
CyberArk Web Portal Devices Appliances

Websites/ Cloud
Web Apps Infrastructure
Isolate Privileged Sessions: How does it work?

End Users CyberArk Solution Enterprise Resources

Digital Vault
Servers Mainframes

Passwords prevented
from reaching users
and devices
Databases Applications

Privileged Session
Manager
Malware blocked Network Security
on PSM to protect Devices Appliances
resources
Login via CyberArk Web Portal or
Native Unix Command Line

Tamper-proof recording and secure Websites/ Cloud


Web Apps Infrastructure
storage of complete audit trail

*Layered with Enterprise Password Vault


View and search for privileged session activities

 View session history by event


 Browse to replay specific activities

 Search for specific sessions or commands


 Replay sessions starting at that moment in time
CyberArk Privileged Threat Analytics

Collect

Collect and analyze the right data

Detect
Identify suspicious activities and
behaviors

Alert
Notify security teams with detailed
incident information

Respond
Enable speedy response and
automated containment
Four Critical Steps to Stopping Advanced Threats

Discover all of your privileged accounts

Protect and manage privileged account credentials

Control, isolate and monitor privileged access


to servers and databases

Use real-time privileged account intelligence to


detect and respond to in-progress attacks
Thank you!
Srinivas

S-ar putea să vă placă și