Magazine Button
CyberArk delivers new identity security offerings to drive customer success

CyberArk delivers new identity security offerings to drive customer success

Cybersecurity

CyberArk, a global leader in identity security, has announced availability of new subscriptions, programs and tools designed to accelerate organisations’ identity security initiatives and time to business impact. These new offerings complement CyberArk’s Identity Security portfolio, which is centered on Privileged Access Management and focuses on securing individual identities – human or machine – throughout the cycle of accessing critical assets.

Included in the announcement are:

  • Identity Security Subscription Offerings – Customers can benefit from the combined power of Identity-as-a-Service (IDaaS) and the industry’s leading Privileged Access Management solution in offerings that make the most sense for their specific users: workforce user, external vendor or privileged user.
  • CyberArk Blueprint for Identity Security Success –The CyberArk Blueprint has evolved to expand prescriptive guidance across all identities and is centered on core identity security best practices.
  • CyberArk Identity Security Assessment Tool – The Assessment Tool is fully aligned to the CyberArk Blueprint so organisations can assess and track their level of alignment with Identity Security best practices and compare their program maturity with peers across multiple parameters such as industry, region and organisation size.
  • Identity Security Customer Success Plans – Success Plans are strategically packaged resources, guidance and expertise to help customers successfully execute an identity security program while getting the most value from their solutions as quickly as possible.

“CyberArk continues to invest and execute on our vision for identity security, putting it at the centre of major industry forces like Digital Transformation, cloud migration, attacker innovation and compliance,” said Udi Mokady, chairman and CEO, CyberArk.

Click below to share this article

Browse our latest issue

Intelligent CISO

View Magazine Archive