CyberArk Unveils a Simple, Interoperable, and Innovative Identity Security Fabric
“We need to reinvent ourselves and present a comprehensive solution for identity security,” said Udi Mokady, the founder and CEO of CyberArk, as he kicked off the first day of the CyberArk Impact 2022 Virtual event. The emerging new work ethic norm that highlights BYOD and WFH culture has taken the trend by storm. According to Forbes, 30 per cent of employees worldwide are now working away from the office on a permanent basis.
The revolution of identity-centric attacks happens to coincide with the revolution of our working norm. A typical medium to large organisation has hundreds of thousands of identities, and more than half of its workforce employees and machine identities can access sensitive data. There are thousands of identities to manage, and the attack surface is continuing to expand. Identity is now, of course, a target for the persistently innovative cybercriminal organisations. They have laboratories. They have their supply chain, so the first thing a company should be concerned about is that every identity requires strong security.
Holistic Identity Protection
Chen Bitan, the Chief Product Officer and CO-Founder of CyberArk kept the momentum going as the 2nd speaker of the day saying, “Credential theft protection is part of what we call a holistic identity security approach.” He went on, “CyberArk provides the leading solution for single sign-on capabilities tightly coupled with the strong authentication and the continuous and password-less MFA solution.”
Through the utilisation of Intelligent Privilege Controls, CyberArk’s Identity Security Platform is able to provide integration of identity protection measures. The control point will carry out identity automation and orchestration that is both flexible and adaptable, as well as provide seamless and secure access for all identities. This is the same degree of security control that was utilised by the IT department when it accessed the IT network, and it is now able to be applied to and attained for workforce employees that have access to SaaS or the application.
The six main pillars of the CyberArk Identity Security Platform are the core identity security services CyberArk offers for its strategic partners and clients this year:
- Workforce and Customer Access.
- Endpoint Privilege Security.
- Privileged Access Management (PAM).
- Secrets Management.
- Cloud Privilege Security.
- Identity Management.
CyberArk, like most of the other cybersecurity solutions that have been released in recent years, is coming out with a holistic approach to protecting identities. As Bitan elaborated, the company’s primary focus right now is on the best way to provide an all-encompassing, complete solution for the clients. The idea of shared services is new territory for CyberArk, and it is designed to provide interoperability among all six pillars of the CyberArk Identity Security Platform.
The SaaS identity security intelligence solution CyberArk announced will deliver highly comprehensive insight to its clients and combines privileged analytics with user behaviour. And the shared services would be available for all CyberArk’s privileged cloud and SaaS customers most probably at the end of this year, Bitan promised.
2022 – 2023 Resolutions
In the end, the purpose of cybersecurity is to make it possible for clients to reach the highest possible degree of safety in the shortest possible amount of time. As the company moves forward, from the viewpoint of CyberArk, the identity security solutions will call for an emphasis on simplicity, interoperability, and innovation.
They are prepared to make the necessary technological commitment as well as major commitment in the aforementioned areas in order to offer a comprehensive solution to identity security. For the sake of simplicity, the CyberArk team is committed to bringing a simpler system implementation, particularly for PAM and SaaS customers, and places an emphasis on the customers’ capacity to independently manage themselves. Simply said, this gives consumers the ability to reach the greatest possible degree of security in a significantly shorter amount of time.
Interoperability, on the other hand, refers to the process by which each of the six core services would be customised and intercommunicated with one another while operating on a single unified platform with a consistent user interface. This was previously described. CyberArk is thrilled to deliver all the orchestration of identity security from a single control point, which will provide customers with the utmost freedom to manage the protection of their organisational identities.
And, of course, innovation is a top objective for every technological company. Cybercriminal organisations are reinventing their attacks by exploiting gaps and weaknesses as technology advances and the terrain changes. Innovation is an unavoidable driving factor in maintaining a level playing field between cybersecurity solutions like CyberArk and its adversary, malicious actors.
“We just have to innovate faster,” Mokady concluded.