“We liked how easy it was to manage secrets on Red Hat OpenShift using CyberArk’s secrets management platform.”
“The CyberArk Privilege Cloud solution is primarily managed by CyberArk. We’re always on the right version and the fact that we don’t have to get into the low-level detail is one of the features we appreciate the most. I can confidently give the CyberArk team a ’10 out of 10’ for their support and knowledge.”
“Of course, the information systems department has also been addressing company-wide security and compliance measures. However, the game development department handles vital data assets using a dedicated development environment for each project. Since we sell our content around the world, we also need to consider laws and regulations from the outset to create products that comply with the rules of each country and region. In addition, since we are operating a large-scale system with numerous development projects running concurrently, we add our own approach to support smooth creativity."
“With a mixture of old and new IT environments, J-SOX compliance and internal control efforts tend to leave issues unresolved. In particular, management of privileged access to systems and security measures were one of our key issues. In the process of reforming the old architecture to the new architecture, we are implementing various enhancements, such as zero-trust-based security operations, a shift from perimeter security to user-based security, and enhancement of asset management and log management for quick incident response. We are working to elevate our security measures to realize cloud-native IT that can digitally connect users in the future.”
"CyberArk is a complete identity security solution that is built to satisfy a wide range of audit requirements. It is also a good choice for us because it provides consistent management across multiple platforms. Since the number of users accessing each system is completely different, one of the advantages of CyberArk is that it offers a flexible licensing structure in terms of the number of simultaneous connections."
“With CyberArk, we have better visibility into who is accessing what and worry less about privileged access. Now we focus on delivering high-value customer service and experience improvements. With CyberArk, we are getting users to a state where they do not log into devices until and unless there is a need – such as a change, service request or incident. This is something we can enforce and monitor via CyberArk, and which is helping in risk reduction and achieving operational efficiency.”
“Management recognized that strengthening security was essential in promoting digital transformation. Initially, there were various lacks in security measures, but since establishing the ICT Promotion Division in 2018, we have worked to build a solid security infrastructure, both technically and in terms of management and operations.”
“User experience became an advantage of CyberArk Privilege Cloud.”
“Netron was planning on introducing a PAM strategy mainly due to the company’s realization that manual management of privileged accounts could not effectively prevent human errors, protect privileged credentials and offer robust audit capabilities. We decided to introduce commercial solutions to reduce operational and maintenance (O&M) costs, ensure effective operational management, and significantly improve security.”
“In the face of evolving cyber threats, our commitment to preserve the trust of our customers led us to rethink traditional security measures. We realized that in a world where digital identities are proliferating and privilege boundaries are fully circumvented, adopting a zero-trust approach with time-based access would dramatically reduce the attack surface.”