Cyber-Ark Software Ltd.
September 2010 by Marc Jacob
Contact : Gil Fromovitch
Year of creation : 1999
Activities : Cyber-Ark is an Information Security company, specializing in Privileged Identity Management (PIM) – a suite of products for securing and managing administrative shared accounts within the Enterprise (changing the password, securing it, auditing who accessed these passwords, when etc.). With Cyber-Ark’s PIM solution enterprises can approach compliance with confidence, eliminate insider threats and improve workforce productivity.
Description of your main product for year 2010/2011 :
Privileged Identity Management is an enterprise-class, unified policy based solution that secures, manages and monitor all privileged accounts and activities associated with datacenter management including hosted environments and the enterprise’s servers itself.
• Enterprise Password Vault (EPV) - Manages and secures privileged shared accounts on more than 70 device types including different operating systems, network devices, Security Appliances, SAP etc. EPV provides the accountability on WHO (IT user) has used WHICH (network device) Privileged Shared Account, WHEN and WHY.
• Privileged Session Manager (PSM) - enables organizations to control and monitor privileged access to sensitive systems and devices. PSM records the privileged user’s session to give DVR-like playback of all activities performed as well as secure remote access to sensitive systems using privileged single sign-on without divulging credentials to end users e.g. 3rd party personnel.
• Application Identity Manager (AIM) - eliminates hard-coded, clear text passwords embedded within application scripts and code and easily visible to developers, DBAs, IT personnel etc. AIM secures these passwords and by running a command instance can fetch the password from our Vault repository using a secure,audited, andcontrolled channel.
• On-Demand Privileges Manager (OPM) - The first unified solution for managing and monitoring superusers and privileged accounts under one roof. Usage of accounts such as ’root’ users on UNIX is no longer anonymous and can now be controlled by pre-defined granular access control, where both the command itself and the output are recorded.
Resellers, Value Added Resellers : Cyber-Ark is working with over 100 global partners.
Other partnership :
Web site url : www. cyber-ark.com