Identity security with automation and AI

Identity security with automation and AI

Share post

A leader in identity security has added new capabilities to its identity security platform. By deploying automation and AI features across the platform, it becomes significantly easier to apply intelligent permission controls to all identities - human and non-human.

With CyberArk's identity security platform, companies can implement zero trust and least privilege concepts with complete transparency. The platform with intelligent authorization controls offers secure access for any identity from any location and to a wide variety of IT environments and resources. CyberArk is now further improving identity security with innovative functions related to automation and artificial intelligence. The most important innovations include:

  • AI-powered automation of policy creation: Processing events generated on endpoints and creating and maintaining policies that follow security best practices can be time-consuming challenges—especially for large organizations with heterogeneous environments. With the CyberArk Endpoint Privilege Manager, the events can be processed automatically in order to immediately reduce possible risks. A new module for policy recommendation, which uses artificial intelligence and machine learning (ML), also supports the implementation of principles of least privilege on the end devices.
  • advanced automation: CyberArk offers new capabilities for securely automating privileged access management. With the CyberArk Identity Flows solution, tasks such as creating service accounts, adding and removing users or assigning authorizations can be automated. In addition, Conjur Cloud now also supports secure use of admin credentials in automation scripts, further reducing the use of hard-coded credentials in the scripts.

Cross-platform features

  • the automatic detection of accounts on endpoints: CyberArk Privilege Cloud users who also use Endpoint Privilege Manager can automatically detect and then eliminate local administrator accounts. This reduces the risk of credential theft and escalation of privileges on endpoints.
  • advanced secrets management features: CyberArk Secrets Hub will back up secrets to both Azure Key Vault, Azure's native secrets store, and AWS Secrets Manager. Conjur Cloud has a new feature, Conjur Cloud Edge, that optimizes the offline availability of secrets, reduces latency and gives users additional options for scaling across cloud regions. In addition, Conjur's self-hosted version now enables global enterprises to enforce data sovereignty policies.
  • support in establishing the principle of “Zero Standing Privileges”: New features of the CyberArk Secure Cloud Access solution help companies achieve the security goal of "Zero Standing Privileges". Secure Cloud Access provides just-in-time and least-privilege access to public cloud services and supports identity-based compliance misconfiguration detection to give cloud security teams high visibility across multiple clouds.
  • the modernization of privileged access management: With the next release of the self-hosted version of the Privileged Access Manager, companies will receive a simplified user interface, modernized management functions and expanded audit options within privileged sessions. Additionally, self-hosting users can now use the Secrets Hub for centralized secrets management.
  • Shared services for automating access requests: Organizations can now leverage AI and ML for threat detection and response to measurably reduce cyber risk and identify unmanaged privileged accounts.
  • Bring Your Own Key: CyberArk Privilege Cloud users can self-host, manage, and revoke the encryption keys for their secrets. This feature helps organizations in highly regulated industries meet audit and compliance requirements.

“In view of the increasing number of different identities, a holistic, integrated approach to establishing identity security is extremely important. The different treatment of identities with independent technologies leads to unmanageable isolated solutions and therefore misses the point - that entails risks," explains Michael Kleist, Area Vice President DACH at CyberArk. “Our identity security platform breaks down these silos by contextually authenticating identities and then dynamically granting the minimum necessary permissions to access critical resources. In addition, we are also increasingly leveraging ML and AI technologies to further enhance enterprise defenses, allowing them to keep pace with attacker innovations.”

More at Cyberarc.com

 


About CyberArk

CyberArk is the global leader in identity security. With Privileged Access Management as a core component, CyberArk provides comprehensive security for any identity - human or non-human - across business applications, distributed work environments, hybrid cloud workloads and DevOps lifecycles. The world's leading companies rely on CyberArk to secure their most critical data, infrastructure and applications. Around a third of the DAX 30 and 20 of the Euro Stoxx 50 companies use CyberArk's solutions.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more