Press Release Details

View all news

CyberArk Delivers Malware Protection for Industrial Control Systems

June 07, 2016

Industrial Organizations, Such as Manufacturers and Energy Providers, Gain Secure Remote Access Benefits Along With Greater Protection, Detection and Response Capabilities

LONDON--(BUSINESS WIRE)--Jun. 7, 2016-- Infosecurity Europe 2016 – Stand D140 – CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced new cyber security capabilities for industrial control systems (ICS) to limit the progression of malware, better identify privileged account-related risks, and improve remote access security in industrial environments.

This Smart News Release features multimedia. View the full release here:

What You Need to Know About Cyber Threats to Industrial Control Systems (Photo: Business Wire)

What You Need to Know About Cyber Threats to Industrial Control Systems (Photo: Business Wire)

Organizations in manufacturing and pharmaceutical sectors, as well as those providing critical infrastructure like energy and water utilities, benefit from new CyberArk Privileged Account Security Solution capabilities to proactively protect their ICS assets. CyberArk detects and contains cyber threats that could lead to downtime or put consumer safety at risk.

Industrial organizations face greater cyber security challenges today as traditionally air-gapped or segmented operational technology (OT) networks become increasingly connected to IT systems and the internet, exposing critical ICS endpoints and other assets to aggressive threats like ransomware. According to a cyber security study of UK C-level board members, utilities is one of the sectors most exposed to cyber security risk when compared to other key sectors of the economy.

Protect Against Malware and Ransomware Attacks
Aggressive malware attacks targeting ICS have been a common denominator in several recent attacks in the energy and utilities sector, including the much-publicized power outage in the Ukraine and the attack on the Gundremmingen nuclear power plant in Germany. In other cases, highly threatening malware in the form of ransomware has impacted facilities like the Lansing Board of Water & Light (BWL), a Michigan municipal utility in the United States.

Of significant concern is the rise of ransomware attacks in the industrial space. According to a report from The Institute for Critical Infrastructure Technology (ICIT)1, “if a SCADA or ICS system in an energy, utilities or manufacturing organization becomes infected with ransomware, then lives could be jeopardized in the time it takes to investigate the incident and return the systems to operation.” The report continues, “without an adequate investment in bleeding edge endpoint security solutions, ransomware will likely cause more significant harm much sooner.”

Now also available for ICS assets as part of the CyberArk Privileged Account Security Solution, CyberArk Viewfinity can help customers defend against malware and ransomware attacks by combining least privilege and application control to reduce the attack surface and block malware progression. CyberArk Viewfinity can help prevent malware from entering ICS computers such as Human-Machine Interfaces (HMIs) and other assets where significant damage can be done. It does this by automating the management of local administrator privileges and controlling applications on critical endpoints and servers.

According to the U.S. Department of Homeland Security2, implementing application whitelisting in top-hierarchy control computers such as HMIs represents one of the most critical steps in securing an ICS network. To help mitigate the risk of malware-based attacks, CyberArk Viewfinity enables organizations to control and whitelist applications as well as remove local administrator rights from HMIs; it seamlessly elevates privileges based on an organization’s policy, as required by trusted (whitelisted) applications.

Advancing Cyber Security in Industrial Environments
CyberArk delivers privileged account protection for ICS by addressing the vulnerabilities originating from the connectivity between ICS, the IT environments, the internet and remote users. CyberArk helps customers in key ICS cyber security areas such as:

  • Secure and Monitor Remote Access In OT, supply chain management includes the oversight of users, both internal and external to the organization, who require access to ICS networks. This access often involves remote connectivity sessions that can sometimes go unsecured and unmonitored for days or weeks. Updates to the CyberArk Privileged Session Manager v9.7 enhance usability across Unix and Windows environments. CyberArk Privileged Session Manager enables organizations to secure sessions between a remote user and the ICS targets, while allowing these sessions to be monitored and recorded. It also helps block the spread of desktop malware and mitigates the risk of credential theft.
  • Identify Suspicious Activity – Unusual user activity or unauthorized credential use to access the ICS assets could be signs of an in-progress attack. CyberArk Privileged Threat Analytics v3.1 learns typical patterns of activity and continuously monitors privileged user and account activity and can identify and alert on suspicious activity. The alerts can be used by IT, OT and security teams to help detect, automatically respond and disrupt in-progress attacks, dramatically reducing any damage to operations and the business.
  • Quantify the Risk and Reduce the Attack Surface The first step in mitigating the risk of compromised credentials is for an organization to identify all users, applications and associated credentials used for granting access into the ICS. CyberArk Discovery and Audit is designed to find privileged user and application accounts and credentials. The tool generates a full report of scanned assets that includes a list of accounts and associated credentials as well as account status related to the company’s security policy.

“In a world where a manufacturing line could be tampered with to impact the integrity of an automobile’s windshield or the efficacy of a drug, or an attack that could bring transportation systems to a halt, the implementation of risk-based cyber security programs must accelerate,” said Roy Adar, senior vice president, product management, CyberArk. “IT/OT convergence and related cyber security risks can threaten uptime and consumer safety. Nearly all users in ICS environments require some level of privileged access and are therefore being targeted. Protecting ICS users and managing those risks should more closely mirror IT privileged account security best practices.”

Additional Resources

  • Infographic - What You Need to Know About Cyber Threats to Industrial Control Systems
  • Video - CyberArk Brief: How to Address Common Security Risks in Industrial Control Systems (ICS)
  • White Paper - How CyberArk Can Help Mitigate Security Vulnerabilities in Industrial Control Systems
  • White Paper - NIST 800-82 Revision 2: Guide to Industrial Control Systems (ICS) Security
  • White Paper - Protecting the Grid: Addressing NERC CIP v5 Requirements for Securing Privileged Accounts
  • Security Brief - Securing Remote Vendor Access with Privileged Account Security

On July 27, 2016 at 2:00 p.m. EDT, CyberArk will host a webinar entitled, “Security Analysis Debrief of the Ukraine Power Grid Attack.” To register, visit

To learn more about CyberArk Industrial Control Systems Security, visit

1- The Institute for Critical Infrastructure (ICIT), “Combatting the Ransomware Blitzkrieg: The Only Defense is a Layered Defense, Layer One: Endpoint Security,” April 2016
2- Department of Homeland Security – ICS-CERT, “Seven Steps to Effectively Defend Industrial Control Systems,” December 2015

About CyberArk
CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including more than 40 percent of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout EMEA and Asia Pacific and Japan. To learn more about CyberArk, visit, read the company blog,, follow on Twitter @CyberArk or Facebook at

Forward-Looking Statements
This release may contain forward-looking statements, which express the current beliefs and expectations of CyberArk’s (the “Company”) management. In some cases, forward-looking statements may be identified by terminology such as “believe,” “may,” “estimate,” “continue,” “anticipate,” “intend,” “should,” “plan,” “expect,” “predict,” “potential” or the negative of these terms or other similar expressions. Such statements involve a number of known and unknown risks and uncertainties that could cause the Company’s future results, performance or achievements to differ significantly from the results, performance or achievements expressed or implied by such forward-looking statements. Important factors that could cause or contribute to such differences include risks relating to: changes in the rapidly evolving cyber threat landscape; failure to effectively manage growth; near-term declines in the Company’s operating and net profit margins and its revenue growth rate; real or perceived shortcomings, defects or vulnerabilities in the Company’s solutions or internal network system, or the failure of the Company’s customers or channel partners to correctly implement the Company’s solutions; fluctuations in quarterly results of operations; the inability to acquire new customers or sell additional products and services to existing customers; competition from IT security vendors; the Company’s ability to successfully integrate recent and or future acquisitions; and other factors discussed under the heading “Risk Factors” in the Company’s most recent annual report on Form 20-F filed with the Securities and Exchange Commission. Forward-looking statements in this release are made pursuant to the safe harbor provisions contained in the Private Securities Litigation Reform Act of 1995. These forward-looking statements are made only as of the date hereof, and the Company undertakes no obligation to update or revise the forward-looking statements, whether as a result of new information, future events or otherwise.

Copyright © 2016 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

Source: CyberArk

Media Relations Contacts:
fama PR
Brian Merrill, +1-617-986-5005
Liz Campbell, +1-617-558-2191
Investor Relations Contact:
Erica Smith, +1 617-630-6426

Categories: Press Releases
View all news