CyberArk Privileged Identity Management (PIM)
2.40

Values

Reduce Costs

Centralize management

Enhance Staff Productivity

CyberArk Privileged Identity Management (PIM)

Privileged Identity Management Suite (PIM) -Providing access to critical systems, devices, and user accounts

Description

Privileged Identity Management is an area of Identity Management that focuses solely on privileged accounts, powerful accounts used by IT administrators, select business users and even some applications. Organizations considering Privileged Identity Management solutions must prioritize security as a requirement because privileged accounts are frequently targeted by external attackers and malicious insiders to access sensitive data and gain control of the IT infrastructure. Responding to the need for security, Privileged Account Security solutions approach Privileged Identity Management with a laser focus on securing the most sought-after accounts in an organization. Built from the ground up with security in mind, Privileged Account Security delivers unmatched protection, detection and response to cyber attacks when compared to Privileged Identity Management. Tamper-proof storagefor credentials, log files and recordings ensures sensitive information is protected from unauthorized access and misuse. High availability and disaster recovery modules include built-in fail-safe measures, secure backup and simple recovery to meet disaster recovery requirements. Support for strong authenticationincluding multi-factor solutions enables companies to leverage existing authentication solutions for privileged accounts. FIPS 140-2 validated cryptographyaddresses compliance and security requirements. Customizable “request workflows” for credential access approval including dual controls, integration with helpdesk ticketing systems and multiple additional parameters Segregation of duties to ensure that ensure privileged credentials can only be accessed by authorized users for approved business reasons Real-time behavioral analytics to detect and disrupt in-progress attacks