22.01.2016 Views

The GSN 2015 Digital Yearbook of Awards

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CyberArk<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Continuous Monitoring and Mitigation Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CyberArk Privileged Threat Analytics<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> devastating cyberattacks on Sony Pictures, Anthem<br />

and U.S. Office <strong>of</strong> Personnel Management (OPM) demonstrate<br />

that today’s cyber security battle has shifted<br />

from the perimeter to inside the IT network. Once<br />

inside a targeted network, attackers immediately seek<br />

to steal and exploit privileged accounts – the gateway<br />

to sensitive and valuable information. Attackers exploit<br />

these accounts to navigate the system, conduct reconnaissance<br />

and escalate privileges – all while impersonating<br />

authorized users. In fact, industry research indicates<br />

that privileged credential exploitation is a signature in<br />

almost every advanced attack. That’s why organizations<br />

need to be proactively monitoring and recording all<br />

privileged activity to ensure attackers – whether they’re<br />

outside hackers or malicious insiders – are not able to<br />

gain access to critical networks, move laterally across<br />

the network to the target goal, or exfiltrate data without<br />

detection. CyberArk Privileged Threat Analytics detects,<br />

alerts and responds to cyber attacks by collecting, monitoring<br />

and analyzing privileged account data, including<br />

activity from the CyberArk Vault, and data feeds from<br />

security information and event management (SIEM)<br />

systems to identify and lessen the most serious <strong>of</strong> risks.<br />

This solution enables incident response teams to identify<br />

an attack in real time, take the necessary steps to<br />

mitigate the attack and reduce damage. Through industry-leading<br />

analytics, including self-learning, behaviorbased<br />

algorithms, CyberArk enables customers to detect<br />

attacks faster by pinpointing malicious privileged account<br />

activity previously hidden in the sheer volume <strong>of</strong><br />

80

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!