Welcome!

Python Authors: Pat Romanski, Matt Davis, AppDynamics Blog, Donald Meyer, Liz McMillan

News Feed Item

Cyber-Ark Launches New Solution for Securing and Auditing Privileged Accounts on UNIX-based Systems

Cyber-Ark® Software today announced the release of its new SSH Proxy solution that secures, audits, and reports on all privileged SSH activity in UNIX environments. The new solution, available as part of Cyber-Ark’s Privileged Session Management (PSM) suite, monitors and records command-level activity, protects against malware-based attacks and provides real-time intelligence on malicious activity without changing SSH session workflows.

Organizations are recognizing the connection between privileged accounts and internal threats and cyber attacks. Cyber-Ark’s solutions are uniquely designed to protect these powerful privileged accounts from both malicious and unintentional access. The availability of PSM SSH Proxy serves to further reduce an organization’s “attack surface” by limiting the scope of what privileged users are allowed to do within UNIX environments. PSM SSH Proxy is a native solution that does not disrupt the administrator’s existing workflow in UNIX/Linux and network environments using SSH or Telnet.

“Protecting and auditing privileged accounts is now a mandatory first step to provide security, as well as to meet compliance and audit requirements driven by targeted cyber attacks and other threats from internal users,” said Roy Adar, vice president of product management, Cyber-Ark Software. “Cyber-Ark’s new PSM SSH proxy solution extends the ease of use of our market leading, integrated privileged identity management and privileged session management solution to the UNIX environment. There no longer needs to be a compromise between security and usability when protecting privileged access in UNIX/Linux and network environments.”

Cyber-Ark’s PSM SSH Proxy solution isolates the administrator’s workstation from the target server or device, routing all administrative traffic to come through a jump server, which serves as a single control point preventing attackers from bypassing the privileged account protection and audit system. Centralized policy management ensures that all systems comply with relevant regulations while providing organizations with leading incident response and security operations tools. The solution expands the PSM Suite’s ability to seamlessly integrate into SIEM systems and rapidly provide real-time alerts while precisely identifying the users and activities performed during a privileged session.

For more information on Cyber-Ark’s Privileged Session Management Suite, visit the website or download Cyber-Ark’s Next Generation Jump Server Solution Whitepaper.

About Cyber-Ark

Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments. Cyber-Ark works with more than 1,200 customers, including more than 40 percent of the Fortune 100. Headquartered in Newton, Mass., Cyber-Ark has offices and authorized partners in North America, Europe and Asia Pacific. For more information, please visit www.cyber-ark.com.

Copyright © 2013 Cyber-Ark Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of ...
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.