Profile: Cyberark Software Ltd (CYBR.O)
16 Aug 2019
CyberArk Software Ltd., incorporated on February 28, 1996, is a provider of information technology (IT) security solutions that protects organizations from cyber-attacks. The Company's software solutions are focused on protecting privileged accounts, which have become a critical target in the lifecycle of cyber-attacks. The Company's Privileged Account Security Solution consists of various products, such as Enterprise Password Vault, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, Endpoint Privilege Manager and On-Demand Privileges Manager. The Company's products provide protection against external and internal cyber threats and enabling real-time detection and neutralization of attacks.
The Company's Enterprise Password Vault provides customers with a tool to manage and protect all privileged accounts across an entire organization, including physical, virtual or cloud-based assets. Its SSH Key Manager product securely stores, rotates and controls access to SSH keys to prevent unauthorized access to privileged accounts. This includes the protection of keys at rest and in transit, granular access controls and integration with strong authentication solutions. SSH Key Manager is a logical extension to its Privileged Account Security Solution, leveraging its shared technology platform infrastructure, enabling organizations to protect all privileged credentials with a single integrated platform.
The Company's Privileged Session Manager protects IT assets, including servers, applications, databases and hypervisors from malware and provides command-level monitoring and recording of all privileged activity. Privileged Session Manager prevents malware on an infected workstation from capturing a privileged credential and spreading to additional assets. It also provides a single point of control, forcing all privileged access to pass through its server, ensuring that all privileged activity is monitored and recorded. The single point of control also allows for real-time viewing of privileged activities, enabling customers to terminate privileged sessions in real-time as a threat is detected. In addition, Privileged Session Manager records complete privileged sessions and stores the recordings in the Digital Vault to prevent tampering. Auditors, forensics team and others are able to view and search through an entire session recording for specific activities.
The Company's Privileged Threat Analytics product allows organizations to detect, alert, and respond to anomalous privileged activity while attacks are in progress. Privileged Threat Analytics uses algorithms to profile and analyze individual privileged user behavior and creates prioritized alerts when abnormal activity is detected. Privileged Threat Analytics can automatically contain an attack by invalidating a stolen credential to block an attacker from further penetrating the network perimeter. Privileged Threat Analytics uses historical data collected by its Privileged Account Security Solution, Digital Vault and other network data sources to create and maintain a profile of each privileged user's behavior. It specializes in analyzing behavior related to privileged user behavior, thus providing vital intelligence on the critical attack vector.
The Company's Application Identity Manager addresses the challenges of hard-coded, embedded credentials and cryptographic keys being hijacked and exploited by malicious insiders or external cyber attackers. Its Endpoint Privilege Manager is intended to secure and manage the use of privileged accounts and credentials on the endpoint, and can be deployed on premise or as a cloud-based solution. Endpoint Privilege Manager is designed to help organizations reduce the attack surface by removing local administrative privileges for business users, granularly controlling IT administrator privileges on Windows Servers based on role and elevating privileges when necessary and authorized. Endpoint Privilege Manager's application control features also enable organizations to control and monitor all applications within the environment, identify the original source and instances of malicious applications in the environment for incident response, or supporting forensic investigations. Endpoint Privilege Manager also provides a layer of credential protection and can detect and block attempts of malicious applications to hijack credentials and to alert the organization of such in-progress attack.
The Company's On-Demand Privileges Manager allows customers to limit the breadth of access of Unix/Linux administrative accounts and granularly restrict them from performing certain commands and functions. Its shared technology platform includes its Digital Vault, Web Management Interface, Master Policy Engine and Discovery Engine. Digital Vault is an encrypted server that only responds to preset vault protocols to ensure security throughout an organization's network. Its Web Management Interface provides a single, user-friendly interface for customers to set, manage and monitor privileged account security policies across an entire organization. Its Master Policy Engine and Discovery Engine enable organizations to understand the scope of privileged account risk.
The Company's Sensitive Information Management Solution provides a secure platform through which its customers' employees can share sensitive files while enabling the customer to monitor who is sharing these files. This allows organizations to isolate, store, share and track sensitive files and documents, such as customer credit card information, human resource records, intellectual property documents and legal information in a secure, internal environment. It also allows organizations to exchange sensitive information securely with their business partners, customers, suppliers and subcontractors.
The Company competes with CA, Inc., Quest Software Inc. International Business Machines Corporation, Microsoft Corporation, Oracle Corporation, Hewlett-Packard Enterprise Company, Dell Inc., FireEye, Inc., Splunk Inc., Check Point Software Technologies Ltd. and Palo Alto Networks, Inc.
Cyberark Software Ltd
9 Hapsagot St. Park Ofer 2,
P.O. Box 3143
PETAH TIKVA 4951040