Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

CyberArk Unveils New Policy Engine for Securing Privileged Accounts

CyberArk, a provider of enterprise security solutions that help companies secure and manage privileged accounts, today announced the availability of Master Policy, what the company describes as a “bold new policy engine” that enables customers to set, manage and monitor privileged account security through a single interface.

CyberArk, a provider of enterprise security solutions that help companies secure and manage privileged accounts, today announced the availability of Master Policy, what the company describes as a “bold new policy engine” that enables customers to set, manage and monitor privileged account security through a single interface.

“The once complex process of transforming business policy and procedures into technical settings is now easily manageable and understandable to an organization’s stakeholders, including security operations, risk officers and auditors,” the company said.

CyberArk LogoMaster Policy has been embedded at the core of all of CyberArk’s privileged account security products, and is available in version 8.0 of CyberArk’s privileged account security solution that was released today. Master Policy will with all new installations of CyberArk’s Privileged Identity Management (PIM) and Privileged Session Management (PSM) suites, the company said.

Recent studies have shown that organizations underestimate how cyber-attackers can take advantage of privileged accounts for malicious purposes.

In fact, half of the organizations in Cyber-Ark Software’s global IT security survey admitted to sharing passwords to privileged accounts among “approved” users. The problem was more widespread in larger enterprises, with 56 percent acknowledging the password sharing compared to 47 percent in smaller enterprises, the report revealed.

Master Policy enables organizations to set policy first to meet their security and compliance needs, and provides Key benefits including:

• A simplified process for creating and managing privileged account security policy, that can now be set up in minutes rather than days or weeks;

• Improved security posture of the organization by approaching privileged account security with policy first;

• Meets business demands by quickly and accurately translating written policy into privileged account security controls;

Advertisement. Scroll to continue reading.

• Enables organizations to meet and demonstrate compliance regulations like PCI DSS, Sarbanes Oxley, NIST, NERC-CIP and more;

• Allows enterprise global policy to be set while providing controlled, granular level exceptions to meet the unique operational needs of the business;

• Decreases resource strain by empowering security risk and audit teams to enforce policy in their native language.

“Policy is the foundation of a sound security infrastructure. It has been difficult to enforce written policy throughout the enterprise, as it is time-consuming and difficult to translate that written policy to technical settings for operational departments,” said Sally Hudson, Research Director, IDC. “With today’s advanced threat landscape, the enterprise can no longer afford to overlook the importance of accurate policy settings and enforcement. Simplifying this process gives control back to the security, risk and audit teams and allows them to use their expertise to mitigate the risks posed by insider and outsider threats and comply with strict regulations.”

In addition to Master Policy, CyberArk’s version 8.0 includes the Universal Connector, which helps organizations extend privileged session monitoring to virtually any component of their IT infrastructure, including networks, servers, hypervisors, databases, applications and more. Using customizable solutions, automation and offering 200+ existing connectors, CyberArk is able to support most current enterprise systems, the company said.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Funding/M&A

The private equity firm merges the newly acquired ForgeRock with Ping Identity, combining two of the biggest names in enterprise IAM market.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...