CyberArk Provides Security for Inside the Network Perimeter

August 09, 2016

By Steve Anderson - Contributing Writer

The network perimeter is where many common security measures take place. Firewalls, antivirus systems, sandbox operations...most generally these are focused on the initial contact with the network. Protections beyond that point are often less clear, though CyberArk means to have something to say about that with some new tools to better protect those systems inside the perimeter.

With CyberArk's new systems, users will have a better ability to add privileged account information to cloud environments, as well as access to new cloud orchestration systems. CyberArk's Privileged Account Security Solution, for example, will allow organizations to carry out several different functions related to cloud-based secure access, from controlling access to auditing that access. It draws upon several different tools already in place, like Windows PowerShell as well as Jenkins and Puppet.

This is seen as part of a larger movement, as businesses increasingly move data center functions to cloud-based operations, and in turn require greater protective measures to ensure that these systems aren't accessed from the outside any more than is already necessary. With CyberArk's systems in place, there's less exposed area to attack thanks to managed credentials, faster protection thanks to reduced need for discovery processes in provisioning accounts, and a set of processes that can be repeated as needed, meaning a faster, more streamlined establishment.

Senior vice president for product management with CyberArk Roy Adar commented “When investing in the business benefits of the cloud and DevOps strategies, organizations shouldn’t have to make trade-offs between speed, efficiency and security. CyberArk is a trusted advisor and partner in our customers’ cloud migration strategies. An effective cloud strategy must include security from the beginning – not after the fact. We bake privileged account security into cloud automation tools and the processes they enable to create repeatable, reliable security that is responsive to the elasticity of these environments.”

When data centers make a move to the cloud, as these are increasingly doing these days, there follows a reasonable need for improved security. After all, we're no longer talking about internal, in-house systems being accessed for necessary information, but rather about remotely-located systems being accessed. Essentially, businesses are doing exactly what hackers are doing, but with authorization. The tools that keep out hackers aren't supposed to keep out regular users, so if hackers figure out how to look like regular users, that's security gone. Thus, tools like CyberArk work to help ensure that those who should be inside the system are the only ones inside, which is the optimal outcome.

Protecting a data center is vital to its ongoing use, and tools like CyberArk's should be just the thing to help keep that data center safe and fully operational. A data center lost can mean a lot of damage to the bottom line, so with CyberArk to protect it, the data center can continue to provide value safely. 

Edited by Maurice Nagle