sb-nz logo
Story image

CyberArk boosts privileged account security for AWS

13 Feb 2017

CyberArk has expanded privileged account security solutions for Amazon Web Service (AWS), and the company says will help customers protect against, detect and respond to advanced threats.

In an era where many organisations have at least part of their operations in the cloud, CyberArk says that by 2024 more than 80% of loads will run on cloud architecture. With that comes various cybersecurity concerns, particularly in user and application credentials. Privileged user and application credentials are used to manage consoles, enable application to connect with sensitive assets and dynamically scale elastic production environments, the company says.

“CyberArk delivers flexible and secure protection for cloud-based environments. These new capabilities provide greater confidence to security teams that need to make sure privilege-related policies are applied consistently across the enterprise and extended into their enterprise AWS environment,” explains Roy Adar, senior vice president, product management, CyberArk.

The new solutions can detect and rotate credentials based on company policy, monitor and record privileged access.

CyberArk Discovery and Audit simplifies discovery and reporting on areas in the AWS environment. Users can also secure and manage AWS access keys.

“CyberArk helps build privileged account security into cloud environments from the beginning with automatic provisioning and continuous visibility during cloud migration and on-going management,” Adar concludes.

Story image
Gartner reveals the top strategic tech trends for 2021
“CIOs are striving to adapt to changing conditions to compose the future business - this requires the organisational plasticity to form and reform dynamically. Gartner’s top strategic technology trends for 2021 enable that plasticity.”More
Story image
Juniper Networks expands security offering for remote working
Juniper Networks has launched new solutions to enhance work from home security.More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More
Story image
COVID-related email subjects biggest threat in phishing scams
Coronavirus-related email subjects remain the biggest threat in phishing scams, a new study has found.More