The GSN 2015 Digital Yearbook of Awards
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
CyberArk<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Continuous Monitoring and Mitigation Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CyberArk Privileged Threat Analytics<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>The</strong> devastating cyberattacks on Sony Pictures, Anthem<br />
and U.S. Office <strong>of</strong> Personnel Management (OPM) demonstrate<br />
that today’s cyber security battle has shifted<br />
from the perimeter to inside the IT network. Once<br />
inside a targeted network, attackers immediately seek<br />
to steal and exploit privileged accounts – the gateway<br />
to sensitive and valuable information. Attackers exploit<br />
these accounts to navigate the system, conduct reconnaissance<br />
and escalate privileges – all while impersonating<br />
authorized users. In fact, industry research indicates<br />
that privileged credential exploitation is a signature in<br />
almost every advanced attack. That’s why organizations<br />
need to be proactively monitoring and recording all<br />
privileged activity to ensure attackers – whether they’re<br />
outside hackers or malicious insiders – are not able to<br />
gain access to critical networks, move laterally across<br />
the network to the target goal, or exfiltrate data without<br />
detection. CyberArk Privileged Threat Analytics detects,<br />
alerts and responds to cyber attacks by collecting, monitoring<br />
and analyzing privileged account data, including<br />
activity from the CyberArk Vault, and data feeds from<br />
security information and event management (SIEM)<br />
systems to identify and lessen the most serious <strong>of</strong> risks.<br />
This solution enables incident response teams to identify<br />
an attack in real time, take the necessary steps to<br />
mitigate the attack and reduce damage. Through industry-leading<br />
analytics, including self-learning, behaviorbased<br />
algorithms, CyberArk enables customers to detect<br />
attacks faster by pinpointing malicious privileged account<br />
activity previously hidden in the sheer volume <strong>of</strong><br />
80