Menu
CyberArk leads the fight as hackers hone in on business targets

CyberArk leads the fight as hackers hone in on business targets

“Attackers typically exploit privileged credentials to accomplish their goals, which is why privileged access management is a crucial aspect of securing the enterprise."

Security specialists CyberArk has been named a leader in the IDC MarketScape: Worldwide Privileged Access Management 2014 Vendor Assessment, seen as a standout performer across the Privileged Access Management market.

The IDC MarketScape assesses vendors offering products in the privileged access management (PAM) market and notes that, “CyberArk is the PAM pure-play “big gorilla” with the most revenue and largest customer base.”

Distributed in New Zealand through Connector Systems, the company says the compromise and misuse of privileged accounts is a key signature in advanced, targeted cyber attacks.

As demonstrated in recent, devastating attacks on businesses, cyber attackers steal and exploit privileged accounts to conduct a hostile takeover of a company’s entire infrastructure.

By exploiting privileged access, attackers can conduct internal reconnaissance, move laterally throughout a network without detection and complete the goals of the attack.

The IDC MarketScape recognises the critical need of securing privileged accounts and provides businesses with recommendations for evaluating vendors.

“Attackers typically exploit privileged credentials to accomplish their goals, which is why privileged access management is a crucial aspect of securing the enterprise,” says Pete Lindstrom, research director, Security Products, IDC.

“CyberArk has established itself as a privileged access management leader through its breadth of capabilities and commitment to innovation as evidenced by solid revenue numbers and growing customer base.”

The IDC MarketScape report highlights the key functionality businesses should consider when selecting a privileged access management provider, including the ability to manage access to shared accounts with sensitive privileges, remove Windows local administrative functionality and by enhancing visibility of sensitive account activity.

“Protecting against today’s aggressive cyber attacks requires a fundamental shift in security mentality,” says John Worrall, CMO, CyberArk.

“CIOs and CSOs who are serious about security will build defences based on the premise that the attackers are already – or will soon be – on the inside of the organisation.

“By locking down privileged accounts, businesses can prevent attackers from moving freely in the enterprise and stop advanced attacks early in the attack cycle."


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags securityCyberArkcyber

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments