CyberArk UseCase 2
CyberArk UseCase 2
Introduction
This case study of a medium enterprise financial services company is based
on an April 2018 survey of CyberArk customers by TechValidate, a 3rd-party
research service. The profiled company asked to have their name blinded to
protect their confidentiality.
Challenges
The business challenges that led the profiled company to evaluate and
Company Profile
ultimately select CyberArk:
■ Resolved the following challenges after using CyberArk: The company featured in
this case study asked to
■ Too many endpoints with local administrator privileges have its name publicly
■ IT admins having more privileges than they truly need blinded because publicly
endorsing vendors is
■ Adopted CyberArk’s privileged access security because of the following against their policies.
compelling business drivers:
■
TechValidate stands behind
Initiated a proactive security project
the authenticity of this data.
■ Selected a solution for privileged access security to:
Company Size:
■ Limit the exposure of privileged credentials Medium Enterprise
Industry:
Financial Services
Use Case
The key features and functionalities of CyberArk that the surveyed company
uses:
■ About CyberArk
Uses CyberArk for the following:
■ Securing privileged credentials in a vault CyberArk is the only
security company laser-
■ Rotating credentials based on policies
focused on striking down
■ Managing the following types of privileged accounts, credentials, and targeted cyber threats,
secrets with CyberArk in the next 12 to 18 months: those that make their way
inside to attack the heart of
■ Database or application admin accounts the enterprise. Dedicated
■ Local admin accounts on workstations to stopping attacks before
■ Application credentials they stop business,
CyberArk is trusted by the
■ Plans to integrate the following tools with CyberArk within the next 18 world’s leading companies
months: — including more than
■
45% of the Fortune 100
Robotic process automation (BluePrism, UI path)
companies — to protect
■ SIEM (Splunk, Fortinet, LogRhythm) their highest-value
■ Vulnerability management (Qualys, Rapid7, Tenable) information assets,
infrastructure and
applications.
Learn More:
Results
CyberArk
The surveyed company achieved the following results with CyberArk:
CyberArk
■ Reports that since adopting CyberArk to manage their privileged
accounts and credentials, they are now much more secure.
■ Reports that since adopting CyberArk to secure their privileged accounts
and credentials, the time and cost of audit reporting has reduced.
■ Reports that with CyberArk, the time required to manage and maintain
privileged account and credential security has reduced a lot.