Story image

CyberArk launches SAP-certified privileged access security solution

03 Aug 2018

Privileged access security company CyberArk today announced the availability of its SAP-certified CyberArk Privileged Access Security Solution.

The solution can strengthen and extend security across SAP environments, including SAP ERP systems, by protecting against privileged access-related risk and credential compromise.

The CyberArk Privileged Access Security Solution achieved SAP certification as Integrated with SAP NetWeaver technology platform.

It enables organisations to improve operational efficiencies and safeguard critical assets from external attackers and malicious insiders.

With more than 90% of the Forbes Global 2000 relying on SAP applications to run their organisations, credentials for these applications and systems are sought out by attackers to gain access to business-critical information and assets. 

This certification extends CyberArk’s existing SAP integrations, which are available to customers on the CyberArk Marketplace.

SAP is also a new member of the C3 Alliance, CyberArk’s global technology partner program. 

“The CyberArk Privileged Access Security Solution enables SAP-focused organisations to move forward with the confidence that only an SAP-certified solution delivers,” says CyberArk global business development executive vice president Adam Bosnian.

“CyberArk enhances existing risk management and compliance initiatives in SAP environments and extends privileged access security, a critical layer of IT security, to essential business systems.

“It delivers a solution for privileged access security that can scale effectively with these organisations.”

The CyberArk Privileged Access Security Solution enables organisations to:

  • Manage and secure SAP credentials: Organisations can strengthen their security posture and improve operational efficiencies by onboarding accounts into CyberArk’s encrypted centralised repository. With CyberArk, they can also automate password rotation and enable multi-layered privilege access security control across the SAP stack – from the application layer to databases, operating system and servers.  
  • Reduce privileged access security risk: Organisations can quickly detect and halt suspicious activity by monitoring SAP privileged user activity. CyberArk complements SAP’s security controls by managing, protecting and controlling the use of privileged accounts. CyberArk provides a consistent approach to reducing privileged access security risk across the entire enterprise for SAP solutions and other high-value applications and infrastructure.  
  • Meet compliance requirements: Organisations can easily demonstrate compliance with internal enterprise policies and various industry regulations – including SOX, PCI DSS, GDPR and more – with complete visibility into SAP privileged account controls and activity records.
Chillisoft rounds out portfolio with file integrity vendor
Tripwire is the fourth vendor for Chillisoft in six months, adding critical security controls, vulnerability management and file integrity monitoring.
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Optic Security Group celebrates Axis accolade
Auckland-based business security systems provider Fortlock has picked up an award at Axis Communications’ annual Oceania Axis Partner Summit 2019.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.