Professional Documents
Culture Documents
2
PRIVILEGED ACCOUNTS - “KEYS TO THE IT KINGDOM”
PRIVILEGED ACCESS
EXTERNAL ATTACKERS “Keys to the IT Kingdom” MALICIOUS INSIDERS
Provides Proactive
Protection and Detection
#1 Leader in Privileged Access Security
5
CYBERARK NAMED A LEADER IN GARTNER 2018
MAGIC QUADRANT FOR PRIVILEGED ACCESS MANAGEMENT
CyberArk positioned highest for ability to execute and furthest for completeness of vision
Gartner, Magic Quadrant for Privileged Access Management, Felix Gaehtgens, Dale Gardner, Justin Taylor, Abhyuday Data, Michael Kelley, 3 December 2018
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from https://lp.cyberark.com/gartner-mq-pam-leader
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner
disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
6
CYBERARK NAMED A LEADER IN
PRIVILEGED IDENTITY MANAGEMENT
CyberArk ranks highest in current offering and market presence
141474 Source: Forrester Research, Inc. Unauthorized reproduction, citation or distribution prohibited.
7
8
IIOT / OT Security DevOps
Identity Cloud
Security Security
CROWN
JEWELS
Sensitive Infrastructure,
Assets, and Data
Data Security SIEM and Threat
Intelligence
Endpoint Network
Security Security
9
SECURING
ERP & CRM
SYSTEMS
10
CYBERARK BREAKS THE ATTACK CHAIN
Existing Access
On-Premises
Hybrid
Cloud
External Compromise
11
NEW TARGETS – NEW THREATS?
1 Gartner, Hype Cycle for Application Security, 2017, Published: 28 July 2017 ID: G00314199, Analyst(s): Ayal Tirosh, https://www.gartner.com/doc/3772095/hype-cycle-application-security
12
• Hackers exploit vulnerabilities
(multitude of ERP systems,
versions, applications makes it
easy)
13
*ERP Applications Under Fire: How cyberattackers target the crown jewels. Digital Shadows & Onapsis, July 2018
PRIVILEGED ACCOUNTS ACROSS THE MODERN IT STACK
Application
Databases …
Servers e.g. sys, Service Accounts, …
Operating System
(IaaS) e.g. Administrator, root, …, ADM-John
Hardware
14
CHALLENGES IN SECURING SAP
SAP touches everything within an organization; even if not a native SAP tool
16
CYBERARK INTEGRATION WITH SAP
Discover and onboard SAP privileged accounts via native CyberArk REST API
17
CYBERARK SOLUTIONS ENFORCE SAP BEST PRACTICES
BASED ON THE SECURE CONFIGURATION OF SAP NETWEAVER® APPLICATION SERVER USING ABAP
18
PROTECTING THE SAP ENVIRONMENT
SECURING SAP UPGRADE PROCESS
• Upgrading SAP environments is a critical process, which can occur hundreds of times annually
• Utilizing privileged access security capabilities to streamline upgrading via Software Update
Manager (SUM)
1. Check in
2. Automatic rotated
19
SECURING
ROBOTIC PROCESS
AUTOMATION (RPA)
20
SECURING ROBOTIC CREDENTIALS IS PARAMOUNT
22
Thank you
www.cyberark.com
23