This article is more than 1 year old

Stop the credential thieves before they stop your business

CyberArk checks your privileges

Promo Back in 2008, San Francisco's IT infrastructure ground to a halt. An engineer called Terry Childs who managed the network had consolidated all the sysadmin credentials giving access to the system's privileged accounts, but after a dispute with the city government he refused to divulge these vital details.

Look at any major data breach and you will find that privileged credentials are the preferred route for cybercriminals and malicious insiders bent on traversing the network and wreaking havoc on an organisation's most critical data, infrastructure and applications.

Every important IT initiative, from DevOps to cloud and business-critical apps, has an element of privilege in it. If access is left unmanaged and unsecured, this can become an ever-growing attack surface to worry about.

The first-ever Gartner Magic Quadrant for Privileged Access Managementi named CyberArk a leader, positioned highest for ability to execute and furthest for completeness of vision. Separately, Gartner identified privileged account management as the number one project within its Top 10 Security Projects for 2018ii.

The software security firm agrees, insisting that Privileged Access Management is a vital sector that cannot be ignored. Perimeter defences are not enough: determined hackers will always find their way in and organisations must be able to stop the criminals from reaching their intended target.

Privileged access management is not just limited to one piece of software or infrastructure – it can span operating systems, network devices, hypervisors, databases, middleware, applications, cloud services and everything in between.

The CyberArk solution not only restricts access to an organisation's critical assets to those who have the right credentials, but also focuses on heading off any cyber threats that have broken into the system and are making their way towards the heart of the enterprise with malicious intent.

You can read more and download the report here: download now.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


i Gartner, Magic Quadrant for Privileged Access Management, Felix Gaehtgens, Dale Gardner, Justin Taylor, Abhyuday Data, Michael Kelley, 3 December 2018

ii Gartner, Smarter with Gartner, Gartner Top 10 Security Projects for 2018, June 6, 2018

More about

TIP US OFF

Send us news