Security Experts:

Connect with us

Hi, what are you looking for?


Identity & Access

Cyber-Ark Launches Solution to Secure and Audit Privileged Accounts on UNIX

Cyber-Ark Software on Wednesday released its new SSH Proxy solution, an offering designed to secure, audit, and report on privileged SSH activity within UNIX environments.

Cyber-Ark Software on Wednesday released its new SSH Proxy solution, an offering designed to secure, audit, and report on privileged SSH activity within UNIX environments.

The solution is available as part of the company’s Privileged Session Management (PSM) suite, and monitors and records command-level activity, protects against malware-based attacks and provides real-time intelligence on malicious activity without changing SSH session workflows, Cyber-Ark said. 

Cyber-Ark Logo

“Unsecured critical access points are a threat to all sensitive corporate data and systems and represent the greatest security challenge most businesses will face,” Adam Bosnian, EVP Americas & Corp. Development at Cyber-Ark Software, told SecurityWeek in November 2012.

Privileged access points consist of privileged and administrative accounts, default and hardcoded passwords, and application backdoors, Bosnian explained at the time.

Cyber-Ark’s solutions are designed to protect these powerful privileged accounts from both malicious and unintentional access.

“The availability of PSM SSH Proxy serves to further reduce an organization’s ‘attack surface’ by limiting the scope of what privileged users are allowed to do within UNIX environments,” the company said.

The new solution is native and does not interfere with the administrator’s existing workflow in UNIX/Linux and network environments using SSH or Telnet.

Additionally, it isolates the administrator’s workstation from the target server or device, routing all administrative traffic to come through a jump server, which serves as a single control point preventing attackers from bypassing the privileged account protection and audit system, the company said.

Finally, centralized policy management helps ensure that systems comply with relevant regulations while providing organizations with incident response and security operations tools.

Cyber-Ark’s Privileged Session Management Suite can also integrate into SIEM systems to help provide real-time alerts while identifying the users and activities performed during a privileged session.

Related ReadingStolen Login Credentials, Poor Security Practices Led to South Carolina Data Breach

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Identity & Access

Strata Identity has raised $26 million in a Series B funding round led by Telstra Ventures, with additional investment from Forgepoint Capital, Innovating Capital,...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...


Identity and access governance vendor Saviynt has closed a $205 million financing round.

Application Security

Software maker Adobe on Tuesday released security patches for 29 documented vulnerabilities across multiple enterprise-facing products and warned that hackers could exploit these bugs...