CyberArk Advances Insider Threat Detection to Accelerate Incident Response

New CyberArk Capabilities Detect and Alert on High-Risk Privileged Activity During User Sessions to Help Security Teams Better Prioritize Threat Response

SAN FRANCISCO--()--RSA CONFERENCE 2017– Booth #N3209 – CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced advanced insider threat detection capabilities available through the CyberArk Privileged Account Security Solution to automatically detect and alert on high-risk privileged activity during user sessions and enable rapid response to in-progress attacks.

With this release, CyberArk is delivering a new integration that provides deeper insights into privileged activity across an organization. A new data feed from CyberArk Privileged Session Manager into CyberArk Privileged Threat Analytics, both part of the CyberArk Privileged Account Security Solution, enables security teams to receive customizable, prioritized alerts with granular detail on high-risk privileged activity, watch suspicious sessions in-progress, and terminate potentially malicious sessions to disrupt potential attacks – all from one platform. By helping to prioritize the review of privileged session logs, CyberArk can also improve efficiency and shorten IT audit cycles to reduce costs.

Analyze High-Risk Privileged Activity to Stop Insider Attacks
An insider who has gained access to privileged credentials can initiate seemingly legitimate privileged user sessions. Without the automated real-time detection and alerting on risky activities within privileged sessions, an inside attacker may operate undetected.

According to the SANS Institute, only nine percent ranked their insider threat prevention methods as ‘very effective.’1 Most organizations are overwhelmed by alerts, with 93 percent unable to triage all relevant threats.2

The CyberArk solution improves security teams’ ability to respond to external threats and malicious insiders with the flexibility to extend detection beyond initial account logon events. CyberArk allows security operations teams to assign risk levels that are most relevant to their organization, monitor and analyze actual behavior during a privileged session, identify activity or commands that may indicate compromise, and prioritize threat response based on alert severity.

Improve Productivity and Cost Savings for Audit and Compliance
Based on CyberArk’s experience working with customers, an average large corporation could have thousands of privileged user sessions running on its IT infrastructure each day. With enormous amounts of security data and privileged session recordings to sift through, it becomes nearly impossible for audit and compliance teams to identify risky or suspicious activity. Furthermore, to meet certain global audit and compliance regulations, dozens of full time auditors who are focused solely on this task are often required to manually review a certain percentage of all privileged session activity.

CyberArk delivers a new level of automation for compliance and audit teams. The CyberArk solution applies risk scores based on customer-defined policies to live and recorded sessions, empowering auditors to prioritize or deprioritize privileged activity for review. This enables them to work more efficiently, deliver greater value to the business, accelerate audit cycles to reduce total IT audit costs, and create a consistent approach for examining the risks associated with privileged activity.

“By delivering an integrated solution for threat detection based on privileged sessions, we help identify malicious activity hidden in a sea of legitimate data, and enable rapid threat response,” said Roy Adar, senior vice president, product management, CyberArk. “In addition, organizations could potentially save thousands of man hours that would have been spent manually reviewing sessions. These time and cost savings are especially important in context of requirements like those associated with the Monetary Authority of Singapore (MAS) Technology Risk Management (TRM) guidelines and similar global regulations.”

Supporting this announcement, cyber security experts from CyberArk Labs and customers’ security operations teams identified some examples of commands that are frequently associated with malicious – or accidentally damaging – behavior. Highly sensitive commands that were frequently cited as being indicative of risk include “mmc.exe, Active Directory Users and Computers” on Windows systems, as well as commands containing the terms “authorized_keys” and “sudoers” on *nix systems.

To learn more, read the CyberArk blog: “Spot Insider Threats: 10 Commands Commonly Used During the Cyber Attack Cycle.”

Availability
CyberArk Privileged Session Manager v9.8 and CyberArk Privileged Threat Analytics v3.4 are available now. Contact CyberArk sales to learn more about bundled pricing options.

Additional Resources

1- "Insider Threats and the Need for Fast and Directed Response," April 2015
2- "McAfee Labs Threats Report," December 2016

About CyberArk
CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including more than 45 percent of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout EMEA and Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.

Forward-Looking Statements
This release may contain forward-looking statements, which express the current beliefs and expectations of CyberArk’s (the “Company”) management. In some cases, forward-looking statements may be identified by terminology such as “believe,” “may,” “estimate,” “continue,” “anticipate,” “intend,” “should,” “plan,” “expect,” “predict,” “potential” or the negative of these terms or other similar expressions. Such statements involve a number of known and unknown risks and uncertainties that could cause the Company’s future results, performance or achievements to differ significantly from the results, performance or achievements expressed or implied by such forward-looking statements. Important factors that could cause or contribute to such differences include risks relating to: changes in the rapidly evolving cyber threat landscape; failure to effectively manage growth; near-term declines in the Company’s operating and net profit margins and its revenue growth rate; real or perceived shortcomings, defects or vulnerabilities in the Company’s solutions or internal network system, or the failure of the Company’s customers or channel partners to correctly implement the Company’s solutions; fluctuations in quarterly results of operations; the inability to acquire new customers or sell additional products and services to existing customers; competition from IT security vendors; the Company’s ability to successfully integrate recent and or future acquisitions; and other factors discussed under the heading “Risk Factors” in the Company’s most recent annual report on Form 20-F filed with the Securities and Exchange Commission. Forward-looking statements in this release are made pursuant to the safe harbor provisions contained in the Private Securities Litigation Reform Act of 1995. These forward-looking statements are made only as of the date hereof, and the Company undertakes no obligation to update or revise the forward-looking statements, whether as a result of new information, future events or otherwise.

Copyright © 2017 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

Contacts

Media Relations Contacts:
fama PR
Brian Merrill, +1-617-986-5005
cyberark@famapr.com
or
CyberArk
Liz Campbell, +1-617-558-2191
press@cyberark.com
or
Investor Relations Contact:
CyberArk
Erica Smith, +1-617-630-6426
ir@cyberark.com

Release Summary

CyberArk (NASDAQ: CYBR) today announced advanced insider threat detection capabilities available through the CyberArk Privileged Account Security Solution.

#Hashtags

$Cashtags

Contacts

Media Relations Contacts:
fama PR
Brian Merrill, +1-617-986-5005
cyberark@famapr.com
or
CyberArk
Liz Campbell, +1-617-558-2191
press@cyberark.com
or
Investor Relations Contact:
CyberArk
Erica Smith, +1-617-630-6426
ir@cyberark.com