...
CyberArk     CyberArk
Ferdinand-Braun-Str. 8 • 74074 Heilbronn
Phone: +49 7131 8873530
Fax: +49 7131 8873539
Internet: http://www.cyberark.com

CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies – including 35 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements. To learn more about CyberArk, visit www.cyberark.com, read the company blog or Xing page.

Congress: European Identity & Cloud Conference 2015 05.05. – 08.05.2015 , Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Congress: European Identity & Cloud Conference 2014 13.05. – 16.05.2014 , Munich, Germany
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Webinar: Mitigate targeted attacks with privileged account analytics 24.03.2014 , 4:00pm CET, 11:00am EDT, 8:00am PDT
Targeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can increase detection rates, cost less and be easier to operate. Learn how advanced and insider attacks maneuver throughout your organization, and where and how to intercept them with targeted privileged account analytics.
Congress: European Identity & Cloud Conference 2012 17.04. – 20.04.2012 , Munich, Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar: Back to the ROOTs 02.02.2012 , 14:00 Uhr
In diesem Webinar erläutert zunächst Martin Kuppinger die aktuellen Trends im Markt für PxM (Privileged Access, Account, Identity, User Management) und die Frage, wo und wie man PxM-Lösungen mit seiner übrigen Identity und Access Management-Infrastruktur verbinden sollte. Daran anschliessend stellt Jochen Koehler von Cyber-Ark praktische Ansätze zur Verwaltung von privilegierten Identitäten vor.
Webinar: Privileged Cloud Identity Management 30.11.2010 , 11:00 Uhr
In diesem Webinar wird zunächst Martin Kuppinger von KuppingerCole eine grundlegende Einführung in das Management privilegierter Benutzer im Unternehmen, innerhalb von Outsourcing-Verhältnissen und in der Public Cloud geben. Der Schwerpunkt wird hier insbesondere auf der Frage liegen, welche Anforderungen an einen Public Cloud oder Outsourcing Dienstleister zu stellen sind, damit Ihr internes (PUM) durch die Hinzunahme von Cloud Services nicht kompromittiert wird. Jochen Koehler vom Privileged Identity Management Spezialisten Cyber-Ark wird daran anschliessend einen überaus interessanten Einblick in die Praxis geben und die Strategie seines Unternehmens zur Absicherung Ihrer Cloud-Strategie erläutern.
Congress: European Identity Conference 2010 04.05. – 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: CLOUD 2010 04.05. – 07.05.2010 , Munich
Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are – Join us in Munich for an exciting event beyond the hype.
Congress: Mittelstandsdialog Informationssicherheit 04.05. – 07.05.2010 , München
Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.
Webinar: Wer war Root? 19.03.2009 , 14:00 – 14:45
Der Umgang mit privilegierten Benutzerkonten, wie beispielsweise “ROOT”, birgt hohe Risiken. In diesem Webinar führen wir Sie in die Grundlagen des Privileged Account Management (PAM) ein und geben Ihnen wertvolle Praxistipps, wie Sie Ihr Netzwerk wirksam gegen interne und externe Bedrohung schützen können.
Congress: 2nd European Identity Conference 22.04. – 25.04.2008 , Munich
For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.
Executive View: CyberArk Privileged Threat Analytics – 7085918.08.2014Martin Kuppinger €190.00
In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared accounts. Still, until relatively recently, those technologies were mostly unknown outside of IT departments. However, the ongoing trends in the IT industry have gradually shifted the focus of information security from perimeter protection towards defense against insider threats. Just as company networks become more open, incorporating multiple interconnected locations, the very notion of network perimeter is gradually disappearing. Traditional perimeter security systems such as firewalls are no longer effective against targeted attacks, and privileged accounts are the primary targets for attackers. Stolen administrator credentials have been the cause of many recent high-profile security breaches (including the famed Edward Snowden case). Compromised technical accounts for network devices enable…

Order the report

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) – 7025722.12.2010Martin Kuppinger €95.00
From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the different aspects of PxM in an integrated solution, for a heterogeneous environment. Cyber-Ark PIM is defined as a suite by the vendor. However, it is more sort of an integrated product with several common elements and different feature sets, going beyond the typical suite approach. Cyber-Ark itself names the common elements as “Privileged Identity Management Infrastructure”. Defining the product as a suite however fits to the licensing approach which allows for selecting the required elements – even while, when looking at the PxM challenge, implementing the entire suite with all features typically is the best approach. Cyber-Ark PIM suite is amongst the leading-edge products in the emerging PxM market, provide one of the most comprehensive feature sets in the entire markets….

Order the report

Vendor Report: Cyber-Ark30.03.2010Martin Kuppinger €95.00
Cyber-Ark has established itself as one of the leading vendors of Privileged Access Management (PAM) solutions and offers one of the most functionally comprehensive products in the market. In addition, Cyber-Ark is active in the field of secure file transfer for secure document handling. The company was founded in 1999 and is investor financed. Its flagship product is the Cyber-Ark Privileged Identity Management (PIM) Suite. The terms PIM, PAM and PUM (Privileged User Management) are often used synonymously, but KuppingerCole prefers the PAM designation. Whatever name is used, this is definitely one of the fastest growing markets in IT today since data leakage and other security issues associated with privileged user accounts are an increasing concern for most companies and organizations. Cyber-Ark enjoys a substantial lead in this market. While small functional weaknesses do exist, they are more than compensated for by the product’s broad range of features and good usability….

Order the report

Vendor Report: Cyber-Ark15.03.2010Martin Kuppinger €95.00
Cyber-Ark hat sich als einer der führenden Anbieter im Bereich von Privileged Access Management (PAM) etabliert und dürfte derzeit die größte funktionale Breite im Markt aufweisen. Darüber hinaus bietet das Unternehmen Lösungen für den sicheren Transfer von Dateien und den Umgang mit sensiblen Dokumenten an. Das Unternehmen wurde 1999 gegründet und ist durch Investoren finanziert worden. Das Kernprodukt ist die Cyber-Ark Privileged Identity Management (PIM) Suite. PIM ist eine andere Bezeichnung für das von KuppingerCole als PAM bezeichnete Marktsegment und wird im Markt weitgehend synonym zu anderen Bezeichnungen wie Privileged User Management (PUM) und Privileged Account Management (PAM) verwendet. Der Markt für PAM-Lösungen ist derzeit eines der am schnellsten wachsenden IT-Marktsegmente. Privilegierte Benutzerkonten und Zugriffe stellen ein signifikantes Risiko für Unternehmen dar, wie an Datendiebstählen und…

Order the report

Mitigate Targeted Attacks with Privileged Account Analytics25.03.2014
Targeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can increase detection rates, cost less and be easier to operate. Learn how advanced and insider attacks maneuver throughout your organization, and where and how to intercept them with targeted privileged account analytics. Watch
Back to the ROOTs02.02.2012
In diesem Webinar erläutert zunächst Martin Kuppinger die aktuellen Trends im Markt für PxM (Privileged Access, Account, Identity, User Management) und die Frage, wo und wie man PxM-Lösungen mit seiner übrigen Identity und Access Management-Infrastruktur verbinden sollte. Daran anschliessend stellt Jochen Koehler von Cyber-Ark praktische Ansätze zur Verwaltung von privilegierten Identitäten vor. Watch
Privileged Cloud Identity Management02.12.2010
In diesem Webinar wird zunächst Martin Kuppinger von KuppingerCole eine grundlegende Einführung in das Management privilegierter Benutzer im Unternehmen, innerhalb von Outsourcing-Verhältnissen und in der Public Cloud geben. Der Schwerpunkt wird hier insbesondere auf der Frage liegen, welche Anforderungen an einen Public Cloud oder Outsourcing Dienstleister zu stellen sind, damit Ihr internes (PUM) durch die Hinzunahme von Cloud Services nicht kompromittiert wird. Jochen Koehler vom Privileged Identity Management Spezialisten Cyber-Ark wird daran anschliessend einen überaus interessanten Einblick in die Praxis geben und die Strategie seines Unternehmens zur Absicherung Ihrer Cloud-Strategie erläutern. Watch
Wer war Root? Was Sie über Privileged Account Management (PAM) wissen sollten20.03.2009
Der Umgang mit privilegierten Benutzerkonten, wie beispielsweise “ROOT”, birgt hohe Risiken. In diesem Webinar führen wir Sie in die Grundlagen des Privileged Account Management (PAM) ein und geben Ihnen wertvolle Praxistipps, wie Sie Ihr Netzwerk wirksam gegen interne und externe Bedrohung schützen können. Watch
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.