Story image

CyberArk boosts privileged account security for AWS

13 Feb 17

CyberArk has expanded privileged account security solutions for Amazon Web Service (AWS), and the company says will help customers protect against, detect and respond to advanced threats.

In an era where many organisations have at least part of their operations in the cloud, CyberArk says that by 2024 more than 80% of loads will run on cloud architecture. With that comes various cybersecurity concerns, particularly in user and application credentials.
Privileged user and application credentials are used to manage consoles, enable application to connect with sensitive assets and dynamically scale elastic production environments, the company says.

“CyberArk delivers flexible and secure protection for cloud-based environments. These new capabilities provide greater confidence to security teams that need to make sure privilege-related policies are applied consistently across the enterprise and extended into their enterprise AWS environment,” explains Roy Adar, senior vice president, product management, CyberArk.

The new solutions can detect and rotate credentials based on company policy, monitor and record privileged access.

CyberArk Discovery and Audit simplifies discovery and reporting on areas in the AWS environment. Users can also secure and manage AWS access keys.

“CyberArk helps build privileged account security into cloud environments from the beginning with automatic provisioning and continuous visibility during cloud migration and on-going management,” Adar concludes.

Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).