Menu
CyberArk leads the fight as hackers hone in on business targets

CyberArk leads the fight as hackers hone in on business targets

“Attackers typically exploit privileged credentials to accomplish their goals, which is why privileged access management is a crucial aspect of securing the enterprise."

Security specialists CyberArk has been named a leader in the IDC MarketScape: Worldwide Privileged Access Management 2014 Vendor Assessment, seen as a standout performer across the Privileged Access Management market.

The IDC MarketScape assesses vendors offering products in the privileged access management (PAM) market and notes that, “CyberArk is the PAM pure-play “big gorilla” with the most revenue and largest customer base.”

Distributed in New Zealand through Connector Systems, the company says the compromise and misuse of privileged accounts is a key signature in advanced, targeted cyber attacks.

As demonstrated in recent, devastating attacks on businesses, cyber attackers steal and exploit privileged accounts to conduct a hostile takeover of a company’s entire infrastructure.

By exploiting privileged access, attackers can conduct internal reconnaissance, move laterally throughout a network without detection and complete the goals of the attack.

The IDC MarketScape recognises the critical need of securing privileged accounts and provides businesses with recommendations for evaluating vendors.

“Attackers typically exploit privileged credentials to accomplish their goals, which is why privileged access management is a crucial aspect of securing the enterprise,” says Pete Lindstrom, research director, Security Products, IDC.

“CyberArk has established itself as a privileged access management leader through its breadth of capabilities and commitment to innovation as evidenced by solid revenue numbers and growing customer base.”

The IDC MarketScape report highlights the key functionality businesses should consider when selecting a privileged access management provider, including the ability to manage access to shared accounts with sensitive privileges, remove Windows local administrative functionality and by enhancing visibility of sensitive account activity.

“Protecting against today’s aggressive cyber attacks requires a fundamental shift in security mentality,” says John Worrall, CMO, CyberArk.

“CIOs and CSOs who are serious about security will build defences based on the premise that the attackers are already – or will soon be – on the inside of the organisation.

“By locking down privileged accounts, businesses can prevent attackers from moving freely in the enterprise and stop advanced attacks early in the attack cycle."


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Tags securitycyberCyberArk

Featured

Slideshows

Data breach notification laws in NZ: How can partners prepare?

Data breach notification laws in NZ: How can partners prepare?

This exclusive Reseller News Roundtable outlined the responsibilities facing security partners today, assessing risk while evaluating the role of the vendor in providing added layers of protection.

Data breach notification laws in NZ: How can partners prepare?
Meet the leading StorageCraft partners across A/NZ

Meet the leading StorageCraft partners across A/NZ

StorageCraft honoured its top performing partners across Australia and New Zealand (A/NZ), recognising channel excellence following a strong year of growth.

Meet the leading StorageCraft partners across A/NZ
Show Comments