03.03.2017 Views

2016_HSA_Yrbk_YUMPU_r2___

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

<strong>2016</strong><br />

Vendors of IT and Cybersecurity Products and Solutions<br />

CyberArk<br />

<strong>2016</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Continuous Monitoring and Mitigation Solution<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Privileged account protection and threat detection are<br />

at the center of many federal requirements designed to<br />

secure agencies from both internal and external threats.<br />

Third-party contractors, like Harold Martin and Edward<br />

Snowden, add another significant layer of complexity.<br />

Contractors are typically not controlled by an organization’s<br />

internal policies, yet they often have the same – or<br />

greater – levels of privileged access to internal networks<br />

and information.<br />

The CyberArk Privileged Account Security Solution<br />

offers proactive protection of privileged credentials and<br />

threat detection of privileged account activities, while also<br />

enabling federal organizations to respond to advanced<br />

threats. Proactive protection includes the secure storage<br />

and management of privileged credentials, monitoring<br />

and isolation of privileged account sessions, and the<br />

enforcement of least privilege and application control at<br />

the endpoint. The CyberArk solution also features targeted<br />

analytics and the ability to analyze network traffic to better<br />

detect indications of an attack early in the lifecycle, includ-<br />

ing credential theft, lateral movement and privilege escalation.<br />

Incident response teams use CyberArk to quickly<br />

identify threats and shut down in-progress attacks.<br />

Specifically, with its privileged threat analytics capabilities,<br />

CyberArk enables government entities to dramatically<br />

shorten an attacker’s window of opportunity and reduce<br />

damage; rapidly detect attacks with analytics based on<br />

built-in and continuously-updated algorithms; prioritize<br />

incidents that require immediate attention by conducting<br />

event correlation and raising the risk score on critical incidents;<br />

adapt threat detection to a changing risk environment<br />

with machine learning algorithms that continuously<br />

adjust baseline behavior profiles as authorized behavior<br />

changes over time; and automatically respond to a suspected<br />

stolen privileged credential to stop an attacker’s<br />

movement and accelerate remediation.<br />

With its privileged session monitoring capabilities, Cy-<br />

46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!