You are on page 1of 2

CISOSRSUMIREST

Discovery & Audit

Scan your network with The Challenge


CyberArk DNA™ to: Privileged and shared accounts present a significant audit and security challenge to any large
enterprise. Usually there are more shared and privileged accounts than users in any typical
ƒƒ Discover where privileged
organization. With the understanding that shared accounts exist everywhere – desktops, laptops,
accounts exist
servers, databases, security and network devices, virtual machines, application code, web-based
ƒƒ Clearly assess privileged interfaces etc - which need to be accessed by multiple personnel, organizations need to be able to
account security risks easily scan the network to find where these accounts exist and then manage them on an enterprise
level.
ƒƒ Collect reliable and
comprehensive audit Typical enterprise IT environments are comprised of thousands of systems, all controlled and managed
information by a variety of privileged and shared administrative identities— for example Administrator in Windows,
local privileged accounts on desktops, service accounts in Windows, “root” accounts on UNIX/Linux,
ƒƒ Accurately plan project, ESX “root”, Oracle database system/sys, MSSQL sa and many more. These shared, privileged accounts
budget and resources for are powerful accounts that are a common attack vector used in enterprise attacks to cause damage to
solving the problem sensitive assets and data, disrupting normal business operations and inflicting reputational damage on
a company.

Knowing where every single privileged account exists in your network is extremely challenging due to
little documentation and information scattered across multiple departments, locations and devices.
Organizations are often astounded by the number of dormant accounts that exist on systems, once
created by individuals who may have left the company or on systems that are no longer in use.
Company mergers and acquisitions bring a new influx of privileged accounts that are part of the
organizational network and where the existence of privileged accounts may be known to the
organization, it is often surprising to realize how many of them are not managed. Lack of knowledge
around where privileged accounts exist leads to a number of organizational challenges:

ƒƒ Security & Risk Management: Security and IT teams are not fully aware of the risks posed to
Easily scan and discover the
their business to be able to better manage them
magnitude of the privileged
account problem across your
ƒƒ Audit & Compliance: Auditors struggle to collect the necessary information required for audit in
network
a comprehensive, thorough and reliable manner as the organization has not mapped the
privileged account landscape

ƒƒ Project Planning: Difficult to estimate budget and resources needed to solve

Quickly get the answers needed


for audits and privileged account Solution & Key Benefits
risk assessment. The scanning
report highlights mismanaged or For organizations struggling to gain an accurate privileged accounts in their network without having
non-compliant privileged accounts picture of the state of privileged account to install any agents on the local or target systems
management and compliance in their IT and consuming very low network bandwidth.
environment, CyberArk’s Discovery & Audit Once the scan is complete, auditors and security
(CyberArk DNA™) is a standalone, easy to use tool managers get a scan summary to understand how
that exposes the magnitude of the privileged many privileged accounts exist in the target
account problem, often the root-cause of audit environment. CyberArk DNA goes on to provide a
failures and advanced targeted attacks. detailed report into the status of those privileged
Launched from a Windows desktop, CyberArk accounts, highlighting the relevant compliance
DNA™ prompts the user to answer a few simple information of each privileged account.
questions about their environment and begin an
automated scan for privileged accounts. The
simple 3 step process allows organizations to get
very quick answers and insights into the status of
Sample Privileged Accounts Audit
Report for easy identification and
insight of issues.
Discovery & Audit
.

CyberArk DNA™ answers questions such as: Specifications


ƒƒ Powerful scanning with minimal
ƒƒ On which target servers do privileged accounts performance impact – Designed as a CyberArk DNA™ runs on
exist? multi-threaded application to expedite scanning, ƒƒ Windows 7
CyberArk DNA consumes low network
Supported Target Systems for Scanning
ƒƒ Which personal admin accounts were created bandwidth and uses insignificant network and
on my servers? CPU resources on the Active Directory Domain Windows Workstations:
Controllers and target machines. All scans are
ƒƒ Which accounts’ privileges were escalated? performed in read-only mode, without changing ƒƒ Windows 2000
anything in the environment. ƒƒ Windows XP
ƒƒ Which privileged accounts do not adhere to ƒƒ Windows Vista
CyberArk DNA™’s valuable and insightful information
the company’s password policy i.e. password ƒƒ Windows 7
helps organizations:
age is greater than 60 days? ƒƒ Windows 8
Recognize and measure risk by discovering
Windows Servers:
ƒƒ Did one of my contractors add a privileged every single privileged account and its status.
user to one of the servers? Organizations can locate and accurately report on ƒƒ Windows 2000
what privileged, shared or generic accounts exist in ƒƒ Windows 2003
ƒƒ Do ‘backdoor’ application accounts exist on their organizational systems to immediately pinpoint ƒƒ Windows 2008
unknown or improperly managed privileged
products that have been decommissioned? ƒƒ Windows 2012
accounts acting as a quick and simple eye-opener.

The overall result shortens and simplifies the Unix:


Save valuable audit preparation time and cost.
collection and analysis of privileged account Auditors gain a reliable, correlated and ƒƒ RHEL 4-6
information, leading to a smoother, and in comprehensive view of the state of privileged ƒƒ Solaris Intel 10
many cases more comprehensive audit and risk accounts, eliminating complex mapping and ƒƒ SUSE
assessment process while allowing auditors and manual discovery of this information, which is often ƒƒ Fedora
security managers to effectively evaluate and difficult and time consuming to gather. ƒƒ Oracle
assess privileged account issues in enterprises. ƒƒ CentOS
Gain predictability when dealing with the
privileged account problem. Network Protocols
Getting a clear and reliable picture on the
Features & Benefits magnitude and status of privileged accounts creates Windows:
business justification to change the status quo,
CyberArk DNA ’s key features include:

ƒƒ Windows File and Print Sharing
leading the way to better manage risk and improve
ƒƒ Simple to use, non-intrusive scanning operational processes as well as more accurate ƒƒ Windows (WMI)
tool – A simple 3 step process scans the project sizing.
organizational directory for privileged, shared and Unix:
generic accounts on workstations and servers From Discovery To Resolution ƒƒ SSH
without the need to install anything. ƒƒ SFTP
CyberArk’s market-leading Privileged Identity and
Session Management suites offer a comprehensive Sample Data Scanned
ƒƒ Graphical presentation of results – The solution for privileged account protection,
Executive Summary Dashboard presents a clear, accountability and intelligence. From discovering ƒƒ Windows and Unix Accounts
concise view of privileged account risk and where privileged accounts exist, CyberArk leads the ƒƒ Domain Accounts
compliance status. way to easily manage, audit and automate ƒƒ Local Accounts
processes. ƒƒ Windows Service Accounts:
ƒƒ Detailed reporting and flagging – A detailed ƒƒ Windows Services
report can be exported and filtered giving a ƒƒ Scheduled Tasks
‘single version of the truth’ as to which privileged
accounts exist within the organization and the
status of each and every account discovered. The
report flags and alerts on audit findings such as
mismanaged privileged accounts to highlight
privileged account management issues.

©Cyber-Ark Software Ltd. | cyberark.com

You might also like