Password management to protect enterprise users

Password management to protect enterprise users

Share post

New and Enhanced Workforce Password Management Features: The cloud-based enterprise password management solution allows employees to securely collect, store and manage their passwords and other application credentials.

The innovations offer administrators more flexibility and control to reduce risks and improve the security of web applications. In contrast to personal password managers, Workforce Password Management is designed for enterprise environments and meets the requirements of companies in terms of data protection, availability and IT security. This includes, among other things, the support of modern passwordless authentication and directory services.

New Features

Application access control based on usernames: Administrators can now prevent users from adding sensitive or privileged accounts such as *root*, *admin* or *dba* to the Workforce Password Management Vault. This gives them more control over the credentials users store and reduces the risk of highly privileged accounts being added, accessed and shared.
Support for web apps with captchas: Users can now seamlessly access websites that require a captcha at login and resolve third-party captchas required during the login process.
Enhanced reporting for user-added applications: The reports that Workforce Password Management provides now contain detailed information about all applications that users have added. They help administrators conduct regular audits of the applications and enforce established security policies.

Secure web sessions

In addition, Workforce Password Management can be used in conjunction with CyberArk Secure Web Sessions to further protect access to sensitive applications. In the latest version, Secure Web Sessions offers an additional layer of protection with Session Control, which allows administrators to set notifications and rules for specific input fields in business applications that are accessed with credentials from Workforce Password Management. For example, you can use a rule to prevent users from making transfers that exceed a certain amount in the company's banking application and be informed about the attempt.

"Traditional password managers typically lack the controls and features that companies need to protect the credentials of users who are constantly the target of attackers," emphasizes Michael Kleist, Area Vice President DACH at CyberArk. “Password management needs to evolve dynamically as attackers innovate. That's why we continually invest in new workforce password management capabilities to improve usability, security and control for everyone in an organization – from developers and business users to administrators.”

CyberArk employs intelligent entitlement controls for all identities—human and machine—and provides continuous threat detection and response throughout the identity lifecycle. With the CyberArk Identity Security Platform, organizations can implement Zero Trust and Least Privilege with full visibility, ensuring that any identity can securely access any resource - regardless of where the resource or identity resides.

More at Cyberark.com

 


About CyberArk

CyberArk is the global leader in identity security. With Privileged Access Management as a core component, CyberArk provides comprehensive security for any identity - human or non-human - across business applications, distributed work environments, hybrid cloud workloads and DevOps lifecycles. The world's leading companies rely on CyberArk to secure their most critical data, infrastructure and applications. Around a third of the DAX 30 and 20 of the Euro Stoxx 50 companies use CyberArk's solutions.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more