NEWTON, Mass. & PETACH TIKVA, Israel--(BUSINESS WIRE)--CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced new capabilities for reducing cyber security risk in the cloud. CyberArk enables organizations to easily integrate privileged account security into their cloud environments and better secure and manage cloud orchestration and automation tools, such as Chef and Puppet.
Enterprises are increasingly moving data center operations to the cloud and investing in automation tools to drive DevOps initiatives, greater business efficiency and process optimization. These initiatives are increasing the overall number of privileged accounts within IT infrastructures and can quickly expand the potential attack surface. To help reduce security risk created by spinning up new environments, which often leads to the creation of default credentials, privileged account security policies must be incorporated immediately and mirrored consistently across new test, dev and production environments. Additionally, privileged accounts associated with newly created images must be secured simultaneously with the creation of these new environments.
The CyberArk Privileged Account Security Solution allows organizations to secure, manage, control access, rotate credentials, monitor and audit all privileged accounts in the cloud. Working with automation and orchestration tools such as Chef, Puppet, Windows PowerShell, Jenkins and others, CyberArk helps build privileged account security into cloud environments with automatic provisioning and integration during cloud migration and on-going management. Enhanced REST APIs available in CyberArk Privileged Account Security Solution v9.7 enable broader cloud automation capabilities and greater security for DevOps environments.
Simplifying Privileged Account Security for the Cloud
Used to support elasticity in the IT environment and respond to changes in demand, cloud automation tools rely on scripts to automate communication with other parts of the IT infrastructure. While securing a cloud vendor’s web management console APIs is an important step, it must be layered with securing the actual cloud automation and orchestration scripts to ensure they are authentic and haven't been tampered with. To help secure these interactions, and the hard coded credentials used in the process, CyberArk embeds privileged account security into orchestration scripts. With a focus on simplicity and ease of use, CyberArk can automatically take the new virtual machine’s built-in privileged credential and store it in the CyberArk Enterprise Password Vault.
Within organizations’ cloud environments, the rapid creation and deletion of instances and their associated administrator accounts must be closely managed. With that pace of change, organizations can’t rely on after the fact periodic scans to assess vulnerabilities. To decrease exposure time for potentially vulnerable and unprotected new accounts, CyberArk helps automatically provision accounts newly created by cloud automation tools, rotate their credentials based on company policy, and monitor and record access to that account. Working with automation tools, CyberArk can immediately apply privileged account security policies and safeguards across these dynamic environments to further limit risk.
Securing Cloud Migration
CyberArk secures assets running in the cloud, but also integrates privileged account security into DevOps processes, facilitating cloud migrations and enabling organizations to get the full benefit of the agility and elasticity of the cloud. Key benefits of utilizing the CyberArk Privileged Account Security Solution include:
- Reduction of the Attack Surface – Manage and secure credentials required by automation tools for typical workloads without exposing credentials to the risk of compromise
- Instant Protection – Instantly provision privileged accounts in newly created instances by cloud automation tools; eliminate the need for a separate, periodic discovery process and avoid delays
- Consistent Controls – Gain repeatable processes for provisioning privileged accounts in the cloud to enable the implementation of consistent, secure controls that mitigate the risk of human error
“When investing in the business benefits of the cloud and DevOps strategies, organizations shouldn’t have to make trade-offs between speed, efficiency and security,” said Roy Adar, senior vice president, product management, CyberArk. “CyberArk is a trusted advisor and partner in our customers’ cloud migration strategies. An effective cloud strategy must include security from the beginning – not after the fact. We bake privileged account security into cloud automation tools and the processes they enable to create repeatable, reliable security that is responsive to the elasticity of these environments.”
- Video – Securing the Cloud with CyberArk Privileged Account Security
- White Paper – Securing Privileges in the Cloud
- White Paper – CyberArk Privileged Account Security for Amazon Web Services (AWS)
CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including more than 40 percent of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout EMEA and Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.
This release may contain forward-looking statements, which express the current beliefs and expectations of CyberArk’s management. Such statements involve a number of known and unknown risks and uncertainties that could cause the Company’s future results, performance or achievements to differ significantly from the results, performance or achievements expressed or implied by such forward-looking statements. Important factors that could cause or contribute to such differences include risks relating to: changes in the new and rapidly evolving cyber threat landscape; failure to effectively manage growth; fluctuations in quarterly results of operations; real or perceived shortcomings, defects or vulnerabilities in the Company’s solution or the failure of the solution to meet customers’ needs; the inability to acquire new customers or sell additional products and services to existing customers; competition from IT security vendors and other factors discussed under the heading “Risk Factors” in the Company’s most recent annual report on Form 20-F filed with the Securities and Exchange Commission. Forward-looking statements in this release are made pursuant to the safe harbor provisions contained in the Private Securities Litigation Reform Act of 1995. These forward-looking statements are made only as of the date hereof, and the Company undertakes no obligation to update or revise the forward-looking statements, whether as a result of new information, future events or otherwise.
Copyright © 2016 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.