CyberArk

cyber arc

Centralized Privileged Identity Management Solution - Privileged Access Manager

  • Privileged Account Security Enterprise Suite

Privileged account management

Automatically change the privileged account password of the target device based on the policy.

  • Privileged account management

利用ユーザ管理/制限

The administrator sets accessible devices for users.

The user can access the device without seeing the privileged account password.

  • 利用ユーザ管理/制限

利用ユーザ管理/制限

Approval by application workflow is possible when using a privileged account.

Users can only access the devices and hours allowed by the approver.

  • 利用ユーザ管理/制限

Log management/audit

Privileged account usage such as "who", "when", "on which device", "which privileged account" was used, "when was the password changed", "Does the password policy follow company rules", etc. You can check the status on the WebUI or an external Syslog server.

  • Log management/audit

Application ID management (optional)

Application Identity Manager (AIM) automatically changes the password embedded in the script, reducing the load of script correction work due to security measures for automatic login and password change.

  • Application ID management (optional)

Operation record (optional)

Privileged Session Manager (PSM) records the operation history of privileged accounts as videos and operation logs (text), enabling you to monitor detailed activities that could not be understood from login histories and access logs.

  • Operation record (optional)

Command control of privileged accounts (optional)

On-Demand Privileges Manager (OPM) can limit the commands that can be used by each user and grant necessary privileges to shared privileged accounts.

  • Command control of privileged accounts (optional)

SSH key management automation (optional)

SSH Key Manager (SSK) centrally manages SSH keys used to confirm access to privileged accounts and reliability between applications, enabling secure SSH key management and cost reduction by automating key management and operations. be realized at the same time.

  • SSH key management automation (optional)

Real-time threat detection

Privileged Threat Analytics (PTA) collects login events from each server's Syslog, automatically learns normal behavior, and detects abnormal logins and activities.

  • Real-time threat detection

System configuration example (for on-premise version)

  • System configuration example

System configuration example (for SaaS version)

  • System configuration example

Inquiry/Document request

Macnica CyberArk

Mon-Fri 8:45-17:30