Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Cyber-Ark Launches Solution to Secure and Audit Privileged Accounts on UNIX

Cyber-Ark Software on Wednesday released its new SSH Proxy solution, an offering designed to secure, audit, and report on privileged SSH activity within UNIX environments.

Cyber-Ark Software on Wednesday released its new SSH Proxy solution, an offering designed to secure, audit, and report on privileged SSH activity within UNIX environments.

The solution is available as part of the company’s Privileged Session Management (PSM) suite, and monitors and records command-level activity, protects against malware-based attacks and provides real-time intelligence on malicious activity without changing SSH session workflows, Cyber-Ark said. 

Cyber-Ark Logo

“Unsecured critical access points are a threat to all sensitive corporate data and systems and represent the greatest security challenge most businesses will face,” Adam Bosnian, EVP Americas & Corp. Development at Cyber-Ark Software, told SecurityWeek in November 2012.

Privileged access points consist of privileged and administrative accounts, default and hardcoded passwords, and application backdoors, Bosnian explained at the time.

Cyber-Ark’s solutions are designed to protect these powerful privileged accounts from both malicious and unintentional access.

“The availability of PSM SSH Proxy serves to further reduce an organization’s ‘attack surface’ by limiting the scope of what privileged users are allowed to do within UNIX environments,” the company said.

The new solution is native and does not interfere with the administrator’s existing workflow in UNIX/Linux and network environments using SSH or Telnet.

Additionally, it isolates the administrator’s workstation from the target server or device, routing all administrative traffic to come through a jump server, which serves as a single control point preventing attackers from bypassing the privileged account protection and audit system, the company said.

Advertisement. Scroll to continue reading.

Finally, centralized policy management helps ensure that systems comply with relevant regulations while providing organizations with incident response and security operations tools.

Cyber-Ark’s Privileged Session Management Suite can also integrate into SIEM systems to help provide real-time alerts while identifying the users and activities performed during a privileged session.

Related ReadingStolen Login Credentials, Poor Security Practices Led to South Carolina Data Breach

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Funding/M&A

The private equity firm merges the newly acquired ForgeRock with Ping Identity, combining two of the biggest names in enterprise IAM market.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...