Professional Documents
Culture Documents
CONFIDENTIAL INFORMATION 2
PRIVILEGED CREDENTIALS IN THE NEWS
CONFIDENTIAL INFORMATION 33
ATTACKERS DON’T PLAY BY
THE RULES
Unmanaged privilege
has a potential to
create and multiply
negative
Well, once you have admin access on a particular
consequences of a system you can pretty much do anything you want on
it.
breach – A response to “why wasn’t there an alarm for 11 days?”,
SolarWinds hearings
cyberark.com
ATTACKERS
DON’T NEED TO
HACK IN – THEY
JUST LOG IN
5
KEYS TO THE KINGDOM
Local Admin
Right
Harvested
Credentials
Trusted
Applications
7
THE PRIVILEGED PATHWAY
8
THE PROBLEM: USERS WITH ADMIN RIGHTS CAN…
IOA / IOC
Network firewall
Intrusion Prevention SIEM
Network sandbox
EDR / Anti-malware
Attack Vector Mitigation
CyberArk EPM
Privilege Management
Application Control
Disable/uninstall security software/services/policies
Handler Control
User Account attacks and lateral movement
Tamper with system configuration and OS files
AV/EDR/NGAV –
Tries to detect and block execution based on
signature or behavior
Privilege Management –
Ensures least privilege and removes local admin
Configuration Management –
Mitigates vulnerabilities
and exploitable code in OS and applications
13
Identities Resources
Identity Security Platform
Admins Applications &
Services
Third Parties
Endpoint
Workforce & Endpoint Privileged Cloud Data
Privilege Secrets Identity
Customer Privilege Access Privilege
Security Management Management Environments
Access Security Management Security
Customers • Endpoint Privilege
Manager:
Workstations &
Servers Data Centers
• Secure Desktop
DevOps
OT
15
LEAST PRIVILEGE
16
PRIVILEGE MANAGEMENT
17
APPLICATION CONTROL
18
JUST IN TIME
Right Person. Right Access. Right Resource. Right Time. Right Reason.
Interactive
APPROVAL
Automated
19
PRIVILEGE DEFENSE
20
CREDENTIAL THEFT BLOCKING
APPROVED & RELEVANT APPS
RESTRICTED ACCESS
21
RANSOMWARE PROTECTION
22
PRIVILEGE DECEPTION
Privilege Deception feature enables defenders to quickly detect and proactively shut
down in-progress attacks by placing deception components in the attack path.
23
INTEGRATIONS
Our Technology Partnerships allow us and our partners to create unified, integrated
experiences across diverse disciplines. We partner with the right partners to provide
the best experience and protection for our customers — secure, easy, robust.
24
INTEGRATIONS EXPLAINED
SECURITY INTEGRATIONS
CyberArk gains intelligence by integrating third party
data into its platform including threat intelligence, asset
data, and other indicators of security health.
25
AS A SERVICE DEPLOYMENT
Benefits:
• Security
• Cost effectiveness
• Scalability
• Simplicity
• flexibility
SUPPORTS:
Windows Workstations
Windows Servers
Linux Machines
DEMO
27
CYBERARK IDENTITY SECURITY PLATFORM
Secrets
Manager
Workforce
Identity
Access Privilege DevSecOps Conjur Enterprise
Open Source
Secrets
Customer
Manager
Identity IDENTITY SECURITY PLATFORM Credential Providers
Security First • AI-Enabled • Frictionless • Everywhere
CONFIDENTIAL INFORMATION 39
WHY CYBERARK
#1 6,300 50%
Leader in Privileged Global Customers Trusted by more
Access Management than 50% of the
Fortune 500
40
READY TO START? ENDPOINT PRIVILEGE MANAGER FREE TRIAL
https://www.cyberark.com/try-buy/endpoint-privilege-manager/
41
THANK YOU
42