Menu
CyberArk leads the fight as hackers hone in on business targets

CyberArk leads the fight as hackers hone in on business targets

“Attackers typically exploit privileged credentials to accomplish their goals, which is why privileged access management is a crucial aspect of securing the enterprise."

Security specialists CyberArk has been named a leader in the IDC MarketScape: Worldwide Privileged Access Management 2014 Vendor Assessment, seen as a standout performer across the Privileged Access Management market.

The IDC MarketScape assesses vendors offering products in the privileged access management (PAM) market and notes that, “CyberArk is the PAM pure-play “big gorilla” with the most revenue and largest customer base.”

Distributed in New Zealand through Connector Systems, the company says the compromise and misuse of privileged accounts is a key signature in advanced, targeted cyber attacks.

As demonstrated in recent, devastating attacks on businesses, cyber attackers steal and exploit privileged accounts to conduct a hostile takeover of a company’s entire infrastructure.

By exploiting privileged access, attackers can conduct internal reconnaissance, move laterally throughout a network without detection and complete the goals of the attack.

The IDC MarketScape recognises the critical need of securing privileged accounts and provides businesses with recommendations for evaluating vendors.

“Attackers typically exploit privileged credentials to accomplish their goals, which is why privileged access management is a crucial aspect of securing the enterprise,” says Pete Lindstrom, research director, Security Products, IDC.

“CyberArk has established itself as a privileged access management leader through its breadth of capabilities and commitment to innovation as evidenced by solid revenue numbers and growing customer base.”

The IDC MarketScape report highlights the key functionality businesses should consider when selecting a privileged access management provider, including the ability to manage access to shared accounts with sensitive privileges, remove Windows local administrative functionality and by enhancing visibility of sensitive account activity.

“Protecting against today’s aggressive cyber attacks requires a fundamental shift in security mentality,” says John Worrall, CMO, CyberArk.

“CIOs and CSOs who are serious about security will build defences based on the premise that the attackers are already – or will soon be – on the inside of the organisation.

“By locking down privileged accounts, businesses can prevent attackers from moving freely in the enterprise and stop advanced attacks early in the attack cycle."


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securitycyberCyberArk

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments