Story image

CyberArk launches SAP-certified privileged access security solution

03 Aug 18

Privileged access security company CyberArk today announced the availability of its SAP-certified CyberArk Privileged Access Security Solution.

The solution can strengthen and extend security across SAP environments, including SAP ERP systems, by protecting against privileged access-related risk and credential compromise.

The CyberArk Privileged Access Security Solution achieved SAP certification as Integrated with SAP NetWeaver technology platform.

It enables organisations to improve operational efficiencies and safeguard critical assets from external attackers and malicious insiders.

With more than 90% of the Forbes Global 2000 relying on SAP applications to run their organisations, credentials for these applications and systems are sought out by attackers to gain access to business-critical information and assets. 

This certification extends CyberArk’s existing SAP integrations, which are available to customers on the CyberArk Marketplace.

SAP is also a new member of the C3 Alliance, CyberArk’s global technology partner program. 

“The CyberArk Privileged Access Security Solution enables SAP-focused organisations to move forward with the confidence that only an SAP-certified solution delivers,” says CyberArk global business development executive vice president Adam Bosnian.

“CyberArk enhances existing risk management and compliance initiatives in SAP environments and extends privileged access security, a critical layer of IT security, to essential business systems.

“It delivers a solution for privileged access security that can scale effectively with these organisations.”

The CyberArk Privileged Access Security Solution enables organisations to:

  • Manage and secure SAP credentials: Organisations can strengthen their security posture and improve operational efficiencies by onboarding accounts into CyberArk’s encrypted centralised repository. With CyberArk, they can also automate password rotation and enable multi-layered privilege access security control across the SAP stack – from the application layer to databases, operating system and servers.
     
  • Reduce privileged access security risk: Organisations can quickly detect and halt suspicious activity by monitoring SAP privileged user activity. CyberArk complements SAP’s security controls by managing, protecting and controlling the use of privileged accounts. CyberArk provides a consistent approach to reducing privileged access security risk across the entire enterprise for SAP solutions and other high-value applications and infrastructure.
     
  • Meet compliance requirements: Organisations can easily demonstrate compliance with internal enterprise policies and various industry regulations – including SOX, PCI DSS, GDPR and more – with complete visibility into SAP privileged account controls and activity records.
How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.