Livres blanc

Les Clés de Protection SSH

Les comptes à privilèges donnent un accès direct et illimité aux systèmes les plus critiques et aux données sensibles de l’entreprise. Lorsqu’ils sont usurpés, ces comptes permettent aux attaquants externes et aux employés internes malveillants d’accéder sans entraves au coeur …

Livres blanc

Discover the Keys to Securing SSH

SSH keys provide users and applications with privileged access to critical systems, but all too often these privileged credentials are left unsecured and unmanaged, leaving a gaping hole in any privileged account security strategy. To effectively protect the heart of …

Livres blanc

KuppingerCole: CyberArk Privileged Threat Analytics

This executive view provides an overview of CyberArk’s Privileged Threat Analytics offering. CyberArk, a leading vendor in the PxM market, has released a major update to their behavioral analytics solution that specifically focuses on analyzing abnormal and potentially malicious use of privileged accounts. …

Livres blanc

Securing Privileged Accounts: Meeting the Payment Card Industry (PCI) Data Security Standard (DSS) 3.0 with CyberArk Solutions

Any organization involved in payment card processing is well-aware of their obligations to protect cardholder data in compliance with the Payment Card Industry Data Security Standard (PCI DSS). All entities that store, process or transmit cardholder data and/or sensitive authentication …

Livres blanc

Isolation, Control and Monitoring in Next Generation Jump Servers

Jump servers have emerged in recent years as a security best practice to create a separation between networks with different security requirements. Creating separation is strongly recommended to minimize the risk of a potential attacker accessing critical systems, but does …

Livres blanc

Enforcing the Australian Defence Signals Directorate (DSD)

In early 2013, the DSD updated its list of 35 mitigation strategies designed to help organisations reduce the risk of unauthorised access and minimise the exposure of sensitive information in case of a breach. Of the 35 mitigation strategies DSD …

Livres blanc

CyberArk’s Solutions for Virtualization Security

CyberArk is pioneering the Virtualization Security market with innovative solutions for managing and securing privileged access to the Hypervisor, isolating, controlling and recording privileged sessions on these machines. As the virtual environment grows at a fast pace, organizations are starting …

Livres blanc

Take Control of your Business with Privilege Centric Risk Assessment

The concept of privilege, as it impacts enterprise operations, is critical to assessing, prioritizing and mitigating business risk across the organization. It is broader than the proliferation and loss of control over privileged user accounts. Privileged Account Management, an issue …

Livres blanc

Protecting Financial Information: Sarbanes-Oxley

Undoubtedly, The Public Company Accounting Reform and Investor Protection Act of 2002, also known as Sarbanes- Oxley Act (SOA), is having a major impact on corporate culture and various operational aspects of companies subject to SOA. SOA legislates a far …

Livres blanc

Websense Data Security Suite and CyberArk Inter-Business Vault®

The joint solution provides the following benefits for managing sensitive data throughout its lifecycle: Sensitive Data Discovery Highly Secure Sensitive Data Repository Data Leak Prevention for Data in Motion and Data in Use Conduct secure communications with business partners, customers …