“With a mixture of old and new IT environments, J-SOX compliance and internal control efforts tend to leave issues unresolved. In particular, management of privileged access to systems and security measures were one of our key issues. In the process of reforming the old architecture to the new architecture, we are implementing various enhancements, such as zero-trust-based security operations, a shift from perimeter security to user-based security, and enhancement of asset management and log management for quick incident response. We are working to elevate our security measures to realize cloud-native IT that can digitally connect users in the future.”
“CyberArk is the global leader in identity security, both customers and partners gain a lot of confidence from that. Prospective clients learn that we take cybersecurity seriously and use a renowned identity security solution for privileged access management to keep their data safe. Vendors know CyberArk is a stand-out in the space and is a trusted, easy-to-use solution, which makes compliance with our procedures so much easier.”
“We have thousands of privileged accounts managed by CyberArk. We have taken care to ensure that people only have the level of access that is needed. We deny by default, then allow based on needs, granted by approval.”
"When I recommend a service provider to my clients, I want to be certain that once we’re up and running, the client will be fully supported by the vendor. Our experience with Idaptive has assured me of that."
"We knew this wouldn't be a typical corporate single sign-on implementation. We were going to try to manage old, outdated legacy apps with a very modern web-based solution. We expected a generation gap, but we've been very pleasantly surprised at the ease with which Idaptive has crossed that gap to deliver an SSO solution across every app and site we needed it to."
“And it’s not just visibility that the Idaptive audit feature provides — it’s valuable information that can be leveraged to make informed decisions about the server environment. Now, we can perform our own investigation to see exactly what transpired when something goes wrong. We can then take the actions necessary to reverse or correct the situation.”
"With RPA and Cloud migrations, credentials are becoming more and more spread out away from 'normal' controls. CyberArk can spread out to cover all of the scenarios in a standard way."
“I have deployed CyberArk in companies as small as 150 users, all the way up to Quanta with 16,000 endpoints and numerous individual accounts. In every case, my approach has been identical. And I was again pleased that I did not have to pivot my strategy – the rollout with CyberArk works no matter the size of the company.”
“One measure of the effectiveness of CyberArk is that we now know how every privileged account is being used and there has been a dramatic drop in the opportunity for someone to inflict damage to our environment.”
“I was really impressed by the speed of deployment and how quickly CyberArk was able to deliver.”
“CyberArk gives us the ability to execute much more rapidly. Implementing CyberArk has removed a lot of the overhead from our team and is letting us execute on the business-critical commitments we’ve made to our stakeholders.”
“We also liked the threat analytics capabilities included in the CyberArk platform. The other products we were considering had jump servers and some level of secret storage, but nothing compared to CyberArk’s ability to evaluate commands as they’re executed and detect in real-time when an attack may be underway.”
“It was stunning: We compared the number of applications and secrets that CyberArk Conjur could concurrently manage against competing solutions, and the difference in cost was utterly compelling.”
“We fell in love with the solution. Not only did it solve the issues we were facing around local administrator privileges, but it also had the granular controls hat empower users to make administrative actions with the necessary guardrails to keep everything safe. This is exciting.”
“Being able to assure senior management that we can engage the appropriate controls as needed, and remain compliant throughout the process, is really a big win for us.”