CyberArk

cyber arc

Protecting IDs - From Management to Protection

Portfolio that comprehensively covers identity security

CyberArk provides solutions related to various IDs and privileged IDs from endpoints to multi-cloud and IT infrastructure.
Portfolio that comprehensively covers identity security

[Product 1] EPM (Endpoint Privilege Manager)

Manage permissions for widely used client terminals.
It controls client terminal privileges that are exploited for lateral movement of cyber attackers, creation of backdoors, disabling of security software, impersonation, and information exploitation. Operation-based management that pursues control that does not impair convenience realizes a secure and free environment.

[Product 2] PAM (Privileged Access Manager)

Manage privileged IDs that have a large business impact if misused or abused.
It provides automatic password updates, secure access sessions, records when, where, who, and what, prepares for audits and incidents, and streamlines management of global privileged identities.

[Product 3] CEM (Cloud Entitlement Manager)

Manage permissions and settings in a huge number of IaaS.
CEM visualizes the granted access rights, assesses risks, and provides practical and recommended policies.

[Product 4] Dynamic Privilege Access (DPA)/Secure Cloud Access (SCA)

Achieve "Zero Standing Privilege", a measure that minimizes attack vectors. Provides temporary access to on-premise systems and public cloud accounts.