Press Release Details

View all news

IDC MarketScape Names CyberArk a Leader in the Privileged Access Management Market

March 18, 2015

Leading Analyst Firm Highlights Critical Security Vulnerabilities of Unmanaged Privileged Accounts; Cites CyberArk as PAM Pure-Play Market Leader

NEWTON, Mass.--(BUSINESS WIRE)--Mar. 18, 2015-- CyberArk Software Ltd. (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced that it was named a leader in the IDC MarketScape: Worldwide Privileged Access Management 2014 Vendor Assessment (doc #253303, December 2014). To download a free excerpt, please visit

The IDC MarketScape assesses vendors offering products in the privileged access management (PAM) market and notes that, “CyberArk is the PAM pure-play “big gorilla” with the most revenue and largest customer base.”

The compromise and misuse of privileged accounts is a key signature in advanced, targeted cyber attacks. As demonstrated in recent, devastating attacks on businesses, cyber attackers steal and exploit privileged accounts to conduct a hostile takeover of a company’s entire infrastructure. By exploiting privileged access, attackers can conduct internal reconnaissance, move laterally throughout a network without detection and complete the goals of the attack. The IDC MarketScape recognizes the critical need of securing privileged accounts and provides businesses with recommendations for evaluating vendors.

“Attackers typically exploit privileged credentials to accomplish their goals, which is why privileged access management is a crucial aspect of securing the enterprise,” said Pete Lindstrom, research director, Security Products at IDC. “CyberArk has established itself as a privileged access management leader through its breadth of capabilities and commitment to innovation as evidenced by solid revenue numbers and growing customer base.”

The IDC MarketScape report highlights the key functionality businesses should consider when selecting a privileged access management provider, including the ability to:

  • Manage access to shared accounts with sensitive privileges: This includes tracking any shared account usage by controlling password access and logging user activity for anomalous behavior.
  • Remove Windows local administrative functionality: By removing the local administrator privilege from the user account and providing flexibility and functionality for a user’s particular needs, IT can better support individual job needs while protecting against today’s malware threats that target these admin accounts.
  • Enhance visibility of sensitive account activity: Third-party accounts are often shared intentionally or unintentionally among users outside an organization, making them extremely difficult to monitor. With proper PAM solutions in place, visibility into account activity can be elevated beyond basic capabilities for a full view of the network.
  • Restrict privileges for separation of duties: To minimize the potential for a single user to compromise the system, organizations should implement solutions that provide separation of duties and therefore force the need for collaboration among attackers to compromise a system.
  • Manage embedded application and service accounts: Distributed architectures often require some way to establish a presence on a set of resources and embedding static accounts and passwords has been a very common solution. Organizations must manage, protect and secure these accounts, as they pose a significant security risk.

“Protecting against today’s aggressive cyber attacks requires a fundamental shift in security mentality. CIOs and CSOs who are serious about security will build defenses based on the premise that the attackers are already – or will soon be – on the inside of the organization,” said John Worrall, CMO, CyberArk. “By locking down privileged accounts, businesses can prevent attackers from moving freely in the enterprise and stop advanced attacks early in the attack cycle.”

The CyberArk Privileged Account Security Solution is a complete solution to protect, monitor, detect and alert on privileged accounts. For more information, please visit:

For a free excerpt of the IDC MarketScape report, please visit:

About IDC MarketScape: IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of ICT (information and communications technology) suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor’s position within a given market. IDC MarketScape provides a clear framework in which the product and service offerings, capabilities and strategies, and current and future market success factors of IT and telecommunications vendors can be meaningfully compared. The framework also provides technology buyers with a 360-degree assessment of the strengths and weaknesses of current and prospective vendors.

About CyberArk

CyberArk (NASDAQ: CYBR) is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 40 percent of the Fortune 100 and 17 of the world’s top 20 banks – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA. The company also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit

Cautionary Language Concerning Forward-Looking Statements
This release may contain forward-looking statements, which express the current beliefs and expectations of CyberArk’s management. Such statements involve a number of known and unknown risks and uncertainties that could cause the Company’s future results, performance or achievements to differ significantly from the results, performance or achievements expressed or implied by such forward-looking statements. Important factors that could cause or contribute to such differences include risks relating to: changes in the new and rapidly evolving cyber threat landscape; failure to effectively manage growth; fluctuations in quarterly results of operations; real or perceived shortcomings, defects or vulnerabilities in the Company’s solution or the failure of the solution to meet customers’ needs; the inability to acquire new customers or sell additional products and services to existing customers; competition from IT security vendors and other factors discussed under the heading “Risk Factors” in the final prospectus for the Company’s initial public offering filed with the Securities and Exchange Commission on September 24, 2014. Forward-looking statements in this release are made pursuant to the safe harbor provisions contained in the Private Securities Litigation Reform Act of 1995. These forward-looking statements are made only as of the date hereof, and the Company undertakes no obligation to update or revise the forward-looking statements, whether as a result of new information, future events or otherwise.

Copyright © 2015 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

Source: CyberArk Software Ltd.

fama PR
Brian Merrill, +1-617-986-5005
Christy Lynch, +1-617-796-3210

Categories: Press Releases
View all news