CyberArk Secures Enterprise Cloud Orchestration and Automation
This Smart News Release features multimedia. View the full release here: http://www.businesswire.com/news/home/20160808005737/en/
Enterprises are increasingly moving data center operations to the cloud and investing in automation tools to drive DevOps initiatives, greater business efficiency and process optimization. These initiatives are increasing the overall number of privileged accounts within IT infrastructures and can quickly expand the potential attack surface. To help reduce security risk created by spinning up new environments, which often leads to the creation of default credentials, privileged account security policies must be incorporated immediately and mirrored consistently across new test, dev and production environments. Additionally, privileged accounts associated with newly created images must be secured simultaneously with the creation of these new environments.
The CyberArk Privileged Account Security Solution allows organizations to secure, manage, control access, rotate credentials, monitor and audit all privileged accounts in the cloud. Working with automation and orchestration tools such as Chef, Puppet, Windows PowerShell, Jenkins and others, CyberArk helps build privileged account security into cloud environments with automatic provisioning and integration during cloud migration and on-going management. Enhanced REST APIs available in CyberArk Privileged Account Security Solution v9.7 enable broader cloud automation capabilities and greater security for DevOps environments.
Simplifying Privileged Account Security for the Cloud
Used
to support elasticity in the IT environment and respond to changes in
demand, cloud automation tools rely on scripts to automate communication
with other parts of the IT infrastructure. While securing a cloud
vendor’s web management console APIs is an important step, it must be
layered with securing the actual cloud automation and orchestration
scripts to ensure they are authentic and haven't been tampered with. To
help secure these interactions, and the hard coded credentials used in
the process, CyberArk embeds privileged account security into
orchestration scripts. With a focus on simplicity and ease of use,
CyberArk can automatically take the new virtual machine’s built-in privileged
credential and store it in the CyberArk Enterprise Password Vault.
Within organizations’ cloud environments, the rapid creation and deletion of instances and their associated administrator accounts must be closely managed. With that pace of change, organizations can’t rely on after the fact periodic scans to assess vulnerabilities. To decrease exposure time for potentially vulnerable and unprotected new accounts, CyberArk helps automatically provision accounts newly created by cloud automation tools, rotate their credentials based on company policy, and monitor and record access to that account. Working with automation tools, CyberArk can immediately apply privileged account security policies and safeguards across these dynamic environments to further limit risk.
Securing Cloud Migration
CyberArk secures assets running in
the cloud, but also integrates privileged account security into DevOps
processes, facilitating cloud migrations and enabling organizations to
get the full benefit of the agility and elasticity of the cloud. Key
benefits of utilizing the CyberArk Privileged Account Security Solution
include:
- Reduction of the Attack Surface – Manage and secure credentials required by automation tools for typical workloads without exposing credentials to the risk of compromise
- Instant Protection – Instantly provision privileged accounts in newly created instances by cloud automation tools; eliminate the need for a separate, periodic discovery process and avoid delays
- Consistent Controls – Gain repeatable processes for provisioning privileged accounts in the cloud to enable the implementation of consistent, secure controls that mitigate the risk of human error
“When investing in the business benefits of the cloud and DevOps strategies, organizations shouldn’t have to make trade-offs between speed, efficiency and security,” said Roy Adar, senior vice president, product management, CyberArk. “CyberArk is a trusted advisor and partner in our customers’ cloud migration strategies. An effective cloud strategy must include security from the beginning – not after the fact. We bake privileged account security into cloud automation tools and the processes they enable to create repeatable, reliable security that is responsive to the elasticity of these environments.”
Additional Resources
About CyberArk
CyberArk is
the only security company focused on eliminating the most advanced cyber
threats; those that use insider privileges to attack the heart of the
enterprise. Dedicated to stopping attacks before they stop business,
CyberArk proactively secures against cyber threats before attacks can
escalate and do irreparable damage. The company is trusted by the
world’s leading companies – including more than 40 percent of the
Fortune 100 – to protect their highest value information assets,
infrastructure and applications. A global company, CyberArk is
headquartered in Petach Tikvah,
Forward-Looking Statements
This release may contain
forward-looking statements, which express the current beliefs and
expectations of CyberArk’s management. Such statements involve a number
of known and unknown risks and uncertainties that could cause the
Company’s future results, performance or achievements to differ
significantly from the results, performance or achievements expressed or
implied by such forward-looking statements. Important factors that could
cause or contribute to such differences include risks relating to:
changes in the new and rapidly evolving cyber threat landscape; failure
to effectively manage growth; fluctuations in quarterly results of
operations; real or perceived shortcomings, defects or vulnerabilities
in the Company’s solution or the failure of the solution to meet
customers’ needs; the inability to acquire new customers or sell
additional products and services to existing customers; competition from
IT security vendors and other factors discussed under the heading “Risk
Factors” in the Company’s most recent annual report on Form 20-F filed
with the
Комментарии