CyberArk Delivers Cloud-Based Privileged Account Security to the Endpoint

CyberArk Viewfinity Integrates Privilege Management with Application Control to Help Protect Against Malware-Based Attacks Without Compromising the Business User Experience

NEWTON, Mass. & PETACH-TIKVA, Israel--()--CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced new capabilities for CyberArk Viewfinity that deliver privileged account security to the endpoint. With CyberArk Viewfinity v5.5, customers can benefit from an enhanced, single privilege management and application control solution to reduce the attack surface while being able to block the progression of malware-based attacks, and balance business user productivity and enterprise security.

Following the acquisition of Viewfinity in Q4 2015, CyberArk Viewfinity is now available as part of the CyberArk Privileged Account Security Solution. With this release, customers can gain greater privilege management and application control features in an on-premises or software-as-a-service (SaaS)-based offering. New integration with the CyberArk Shared Technology Platform enables all privileged audit logs to be stored and reviewed centrally, as well as new flexible, customizable reporting capabilities.

Evidence shows that advanced attacks often start with phishing emails sent to non-privileged business users, and a campaign of just 10 emails will typically yield a greater than 90 percent chance that at least one person will become the criminal’s prey.1 If an organization has removed users’ administrative rights on endpoints and servers, but is not monitoring and controlling which applications are allowed to run on these machines, a rogue application containing malware that does not require administrative privileges to run can enter the infrastructure and execute in the environment, giving attackers a foothold into the organization.

Our study of employee endpoints reveals that it is not uncommon to find more than 20,000 different applications across an enterprise2, meaning malicious applications can easily hide in plain sight because IT teams simply don’t have the time to manually analyze everything.

“As malware continues to be a frequently-used and successful means for hijacking credentials, organizations must realize that the endpoint problem is a privilege problem,” said Roy Adar, senior vice president, product management, CyberArk. “The fact is, motivated attackers will eventually get inside your network – it’s what happens next that matters. Establishing a foothold on endpoints and escalating privileges enables attackers to jump from endpoints, to servers, to domain controllers until they own the network. CyberArk Viewfinity extends privilege security to the endpoint to mitigate these risks without excessively restrictive controls on users.”

To effectively reduce the attack surface and support mitigating the risk of a serious data breach without impacting productivity, organizations require solutions that enforce flexible least privilege policies for business and administrative users, and control what applications are allowed to run. Enhanced CyberArk Viewfinity features include:

  • Grey Listing: Monitor “grey” applications – those that are not specifically trusted (white listed) or blocked (black listed) – and apply policies such as restrictive access mode until the application can be further researched.
  • Application Catalog: The Application Catalog displays information on applications installed on end-user computers managed by CyberArk Viewfinity and allows quick discovery of new applications in the system.
  • Application Intelligence: Provides support for application forensic and investigation processes; an aggregated historical timeline is compiled for each application with details such as first seen in the organization, where installed, original source and full family tree.
  • Trusted Sources: This privilege management capability allows System Administrators to automatically create application control and privilege elevation policies based on Trusted Sources such as System Center Configuration Manager (SCCM), software distributors, updaters and more. Trusted Sources can be used to automate the creation of privilege policies for more than 90 percent of applications within the organization.

CyberArk Viewfinity provides CyberArk’s global channel partners with opportunities to reach new enterprise customers with capabilities that target risk management, compliance as well as business and IT operations teams. CyberArk Viewfinity benefits include the ability to automatically create policies based on business requirements, seamlessly elevate application privileges as needed, reduce security risks related to ‘privilege creep,’ reduce help desk costs, leverage integrations with threat detection tools to analyze unknown applications, and accelerate the remediation of threats.

“We expect the endpoint security market to continue to grow, driven in part by increasing enterprise mobile and cloud adoption. To meet new demand efficiently and cost-effectively, organizations are realizing that endpoint security can no longer be a siloed compliance or audit initiative, it must be part of a comprehensive cyber security strategy,” said Robert Westervelt, research manager, security products, IDC. “We believe innovation at the endpoint focused on flexible deployment options, improving the user experience and streamlining management will be important factors that will resonate across risk, compliance and operations stakeholders.”

CyberArk Viewfinity v5.5 is available now in a SaaS, on-premises or Microsoft Group Policy (GPO) deployment model. This offering complements the CyberArk On-Demand Privileges Manager for Unix. For more information, visit http://www.cyberark.com/products/privileged-account-security-solution/viewfinity/.

Sources:
1 - Verizon, “2015 Data Breach Investigations Report”
2 - Viewfinity, “IT Security’s 50 Shades of Grey” whitepaper

About CyberArk
CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 40 percent of the Fortune 100 and 17 of the world’s top 20 banks – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.

Forward-Looking Statements
This release may contain forward-looking statements, which express the current beliefs and expectations of CyberArk’s management. Such statements involve a number of known and unknown risks and uncertainties that could cause the Company’s future results, performance or achievements to differ significantly from the results, performance or achievements expressed or implied by such forward-looking statements. Important factors that could cause or contribute to such differences include risks relating to: changes in the new and rapidly evolving cyber threat landscape; failure to effectively manage growth; fluctuations in quarterly results of operations; real or perceived shortcomings, defects or vulnerabilities in the Company’s solution or the failure of the solution to meet customers’ needs; the inability to acquire new customers or sell additional products and services to existing customers; competition from IT security vendors and other factors discussed under the heading “Risk Factors” in the Company’s most recent annual report on Form 20-F filed with the Securities and Exchange Commission. Forward-looking statements in this release are made pursuant to the safe harbor provisions contained in the Private Securities Litigation Reform Act of 1995. These forward-looking statements are made only as of the date hereof, and the Company undertakes no obligation to update or revise the forward-looking statements, whether as a result of new information, future events or otherwise.

Copyright © 2016 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

Contacts

Media Relations Contacts:
fama PR
Brian Merrill, +1-617-986-5005
cyberark@famapr.com
or
CyberArk
Liz Campbell, +1-617-558-2191
press@cyberark.com
or
Investor Relations Contact:
CyberArk
Erica Smith, +1 617-630-6426
ir@cyberark.com

Release Summary

CyberArk (NASDAQ: CYBR) today announced new capabilities for CyberArk Viewfinity that deliver privileged account security to the endpoint.

$Cashtags

Contacts

Media Relations Contacts:
fama PR
Brian Merrill, +1-617-986-5005
cyberark@famapr.com
or
CyberArk
Liz Campbell, +1-617-558-2191
press@cyberark.com
or
Investor Relations Contact:
CyberArk
Erica Smith, +1 617-630-6426
ir@cyberark.com