2016_HSA_Yrbk_YUMPU_r2___
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
CyberArk<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Continuous Monitoring and Mitigation Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Privileged account protection and threat detection are<br />
at the center of many federal requirements designed to<br />
secure agencies from both internal and external threats.<br />
Third-party contractors, like Harold Martin and Edward<br />
Snowden, add another significant layer of complexity.<br />
Contractors are typically not controlled by an organization’s<br />
internal policies, yet they often have the same – or<br />
greater – levels of privileged access to internal networks<br />
and information.<br />
The CyberArk Privileged Account Security Solution<br />
offers proactive protection of privileged credentials and<br />
threat detection of privileged account activities, while also<br />
enabling federal organizations to respond to advanced<br />
threats. Proactive protection includes the secure storage<br />
and management of privileged credentials, monitoring<br />
and isolation of privileged account sessions, and the<br />
enforcement of least privilege and application control at<br />
the endpoint. The CyberArk solution also features targeted<br />
analytics and the ability to analyze network traffic to better<br />
detect indications of an attack early in the lifecycle, includ-<br />
ing credential theft, lateral movement and privilege escalation.<br />
Incident response teams use CyberArk to quickly<br />
identify threats and shut down in-progress attacks.<br />
Specifically, with its privileged threat analytics capabilities,<br />
CyberArk enables government entities to dramatically<br />
shorten an attacker’s window of opportunity and reduce<br />
damage; rapidly detect attacks with analytics based on<br />
built-in and continuously-updated algorithms; prioritize<br />
incidents that require immediate attention by conducting<br />
event correlation and raising the risk score on critical incidents;<br />
adapt threat detection to a changing risk environment<br />
with machine learning algorithms that continuously<br />
adjust baseline behavior profiles as authorized behavior<br />
changes over time; and automatically respond to a suspected<br />
stolen privileged credential to stop an attacker’s<br />
movement and accelerate remediation.<br />
With its privileged session monitoring capabilities, Cy-<br />
46