“As we grow in deal size and prestige, protecting the trust of our customers through a comprehensive cybersecurity strategy adds value to our clients. Considering that credentials authenticate and authorize the access and privileges to any application and environment, centering our strategy in identity security helps us defend against attacks and provide a seamless user access experience – boosting productivity and customer satisfaction.”
“We built roles based on business rules, departments or divisions in Workday, and then used inbound provisioning from Workday to Active Directory with the former serving as the ‘source of truth’ for all users. Today, everything that happens downstream is automated and driven by the business rules surrounding a Workday value that's synchronized through Active Directory.”
“While there is an increase in security threats, there also is a shortage of experts with in-depth security knowledge and it can be challenging for each of the group’s member companies to staff a dedicated engineer with the appropriate level of experience. Also, when each member company implements its own security measures, there is always the chance that they’re duplicating the efforts of another member company in the environment. Centralizing and optimizing the skill sets of experts from across the group into a common infrastructure has been important and invaluable to our digital transformation."
“With a mixture of old and new IT environments, J-SOX compliance and internal control efforts tend to leave issues unresolved. In particular, management of privileged access to systems and security measures were one of our key issues. In the process of reforming the old architecture to the new architecture, we are implementing various enhancements, such as zero-trust-based security operations, a shift from perimeter security to user-based security, and enhancement of asset management and log management for quick incident response. We are working to elevate our security measures to realize cloud-native IT that can digitally connect users in the future.”
"CyberArk is a complete identity security solution that is built to satisfy a wide range of audit requirements. It is also a good choice for us because it provides consistent management across multiple platforms. Since the number of users accessing each system is completely different, one of the advantages of CyberArk is that it offers a flexible licensing structure in terms of the number of simultaneous connections."
“With CyberArk, we have better visibility into who is accessing what and worry less about privileged access. Now we focus on delivering high-value customer service and experience improvements. With CyberArk, we are getting users to a state where they do not log into devices until and unless there is a need – such as a change, service request or incident. This is something we can enforce and monitor via CyberArk, and which is helping in risk reduction and achieving operational efficiency.”
“Management recognized that strengthening security was essential in promoting digital transformation. Initially, there were various lacks in security measures, but since establishing the ICT Promotion Division in 2018, we have worked to build a solid security infrastructure, both technically and in terms of management and operations.”
“User experience became an advantage of CyberArk Privilege Cloud.”
“Netron was planning on introducing a PAM strategy mainly due to the company’s realization that manual management of privileged accounts could not effectively prevent human errors, protect privileged credentials and offer robust audit capabilities. We decided to introduce commercial solutions to reduce operational and maintenance (O&M) costs, ensure effective operational management, and significantly improve security.”
“In the face of evolving cyber threats, our commitment to preserve the trust of our customers led us to rethink traditional security measures. We realized that in a world where digital identities are proliferating and privilege boundaries are fully circumvented, adopting a zero-trust approach with time-based access would dramatically reduce the attack surface.”