|CyberArk Advances Insider Threat Detection to Accelerate Incident Response|
New CyberArk Capabilities Detect and Alert on High-Risk Privileged Activity During User Sessions to Help Security Teams Better Prioritize Threat Response
With this release, CyberArk is delivering a new integration that provides deeper insights into privileged activity across an organization. A new data feed from CyberArk Privileged Session Manager into CyberArk Privileged Threat Analytics, both part of the CyberArk Privileged Account Security Solution, enables security teams to receive customizable, prioritized alerts with granular detail on high-risk privileged activity, watch suspicious sessions in-progress, and terminate potentially malicious sessions to disrupt potential attacks – all from one platform. By helping to prioritize the review of privileged session logs, CyberArk can also improve efficiency and shorten IT audit cycles to reduce costs.
Analyze High-Risk Privileged Activity to Stop Insider Attacks
According to the
The CyberArk solution improves security teams’ ability to respond to external threats and malicious insiders with the flexibility to extend detection beyond initial account logon events. CyberArk allows security operations teams to assign risk levels that are most relevant to their organization, monitor and analyze actual behavior during a privileged session, identify activity or commands that may indicate compromise, and prioritize threat response based on alert severity.
Improve Productivity and Cost Savings for Audit and Compliance
CyberArk delivers a new level of automation for compliance and audit teams. The CyberArk solution applies risk scores based on customer-defined policies to live and recorded sessions, empowering auditors to prioritize or deprioritize privileged activity for review. This enables them to work more efficiently, deliver greater value to the business, accelerate audit cycles to reduce total IT audit costs, and create a consistent approach for examining the risks associated with privileged activity.
“By delivering an integrated solution for threat detection based on
privileged sessions, we help identify malicious activity hidden in a sea
of legitimate data, and enable rapid threat response,” said Roy Adar,
senior vice president, product management, CyberArk. “In addition,
organizations could potentially save thousands of man hours that would
have been spent manually reviewing sessions. These time and cost savings
are especially important in context of requirements like those
associated with the
Supporting this announcement, cyber security experts from
To learn more, read the CyberArk blog: “Spot Insider Threats: 10 Commands Commonly Used During the Cyber Attack Cycle.”
Threats and the Need for Fast and Directed Response,"
Copyright © 2017 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.
Media Relations Contacts: