“As organisations take advantage of the flexibility of hybrid cloud computing, the agility and speed offered by DevOps methodologies, and leading containerised platforms like Red Hat OpenShift, cross-environment security monitoring is important,” said Chris Morgan, director, Technical Marketing, Red Hat Cloud Platforms, Red Hat. “CyberArk Privileged Session Manager for Cloud enables administrators with web-based cloud and DevOps tool consoles to manage and administer these dynamic and powerful environments while providing security teams with more control and monitoring capabilities to help reduce risk.”
Innovative CyberArk Privileged Session Manager for Cloud capabilities are based on technology acquired from Vaultive. Part of the CyberArk Privileged Access Security Solution, key features include:
“With the rapid adoption of cloud-based resources, it’s no longer enough to control privileged access to just on-premises resources,” said Garrett Bekker, principal security analyst, 451 Research. “However, most organisations are dealing with many separate security tools, most of which have their own administration consoles. With the integration of Vaultive, CyberArk can provide customers with the ability to manage privileged access to both cloud and on-prem resources with a single unified view. This improves the overall experience by letting users feel as though they are operating in an app’s native environment, in the process helping to limit ‘console fatigue.’”
“This launch demonstrates CyberArk’s ability to quickly integrate Vaultive technology and rapidly deliver value to customers. CyberArk Privileged Session Manager for Cloud supports customers’ digital transformation initiatives and migration to the cloud, which are impacting both business and mission critical applications,” said Ben Matzkel, Vaultive founder and CTO, and currently R&D group manager, CyberArk. “To support customers’ defense in depth strategies, it’s vitally important to balance easy access to cloud platforms and web applications with policy-driven access controls, security workflows, and a consistent strategy across on-premises and cloud environments.”