Quantcast
Channel: Networks Asia - IT news
Viewing all articles
Browse latest Browse all 2029

CyberArk expands global technology partner program

$
0
0

CyberArk has announced the expansion of the C3 Alliance, CyberArk’s global technology partner program. Extending the power of privileged account security through new partners and technology integrations, customers can better protect against advanced threats through a deeper set of innovative cyber security solutions.

New C3 Alliance partners and integrations include Atos, Datablink, DB Networks, DBmaestro, EZMCOM, Flexera Software, Gemalto, Hexadite, Illusive Networks, Omada, OneLogin, Palo Alto Networks, Phantom, Proofpoint, Qualys, Radiant Logic, RSA, STEALTHbits Technologies, SyferLock, Thales, Utimaco, Vistara and Yubico.

Launched in April 2016, the C3 Alliance was established to bring enterprise software, IT security and services providers together in order to deliver proactive protection, detection and response to customers by putting privileged account security at the core of their cyber security strategies. The program now has 45 partners and features 63 product integrations to increase the value of existing IT investments and improve security across enterprise priorities associated with cloud, identity security, application security and endpoint.

“Because there is no silver bullet in security, CISOs are increasingly focusing on the value of an integrated security stack. The C3 Alliance helps drive value across existing IT investments through strategic integrations that take advantage of automation and the ability to streamline processes and data sharing,” said Adam Bosnian, executive vice president, global business development, CyberArk. “The escalation of damaging cyber attacks requires new levels of vendor collaboration. This is why the C3 Alliance continues to expand and prioritize vendor integration and alignment around privileged account security and data for more effective cyber security.”

Unmanaged Service Accounts, Application Security and the Attacker Opportunity

Organizations need to be better able to adapt to emerging cyber threats with proactive and responsive controls, especially those aimed at protecting privileged credential vulnerabilities that exist across applications and the IT security stack.

Extensive service account usage by commercial off-the-shelf and internally-developed applications, including identity and access management, DevOps, IT management, asset discovery and vulnerability scanning applications, creates a significant attack surface of unmanaged privileged credentials. Yet, awareness of this application security risk is disproportionately low, even though it may pose one the largest enterprise cyber security vulnerabilities.

 Many of the newest C3 Alliance members and integrations focus on addressing the challenge of managing service accounts and privileged application credentials to better protect enterprise-class and SaaS applications that are critical to regular business operations and incident response.

“The interoperability between RSA Identity Governance and Lifecycle and the CyberArk solution began as a centralized management approach for governing, managing and provisioning all user identities, including privileged identities and access entitlements,” said Jim Ducharme, vice president of Identity Products, RSA. “Today, we are expanding the interoperability with CyberArk to secure the privileged credentials used by RSA Identity Governance and Lifecycle to securely access target systems, such as servers and databases, to collect data and report for compliance and risk management across the enterprise and the cloud to deliver on the benefits of business-driven security.” 

“Qualys’ integration with the CyberArk Privileged Account Security Solution helps customers using the Qualys Cloud Platform to simplify password management for authenticated scans across dynamic environments at large scale,” said Sumedh Thakar, chief product officer, Qualys, Inc. “By securely and centrally managing credentials for hybrid environments with a mix of cloud, on-premises and virtualized assets, organizations can automate scanning, increase accuracy and reduce compliance costs.”

“The Phantom security automation and orchestration platform connects in-house and third-party systems to help security operations gain better insight into potential threats across the IT environment, then reduce the time necessary to detect and respond,” Robert Truesdell, director of product management, Phantom. “Phantom apps require privileged credentials to access these systems and that powerful access must be managed and controlled in a consistent, scalable way. That's where our integration with CyberArk becomes so valuable. As our platform continues to expand, we have to be able to centralize the management and security of these privileged application accounts to reduce the attack surface and keep credentials synchronized.”

C3 Alliance Drives Channel Opportunities

C3 Alliance members typically integrate with the CyberArk Privileged Account Security Solution. These integrations have expanded opportunities for reseller and system integration partners that can help customers further maximize existing IT investments by driving additional value and insight.

“Managing service accounts across multiple technologies continues to be a challenge that our clients face,” said Serafino Napoleone, director, Cyber Risk Services at Deloitte. “With expanding C3 Alliance integration capabilities, our clients are now able to automate and strengthen the Identity and Access Management controls on their existing technologies and platforms, while simultaneously benefitting from increased privileged account security and reduced vulnerability to cyber attacks.”

“Integrating privileged account security capabilities from CyberArk with other key technologies, such as identity and access governance, allows us to differentiate our business through high-value security services,” said Arun Kothanath, chief security strategist, DIT/Clango, Inc. “We view the C3 Alliance as a tremendous opportunity to deliver an expanding set of innovative solutions to our customers. These solutions help them prioritize privilege as part of their cyber security strategies, such as the ability to centrally manage all identities to mitigate risks and support compliance.”


Viewing all articles
Browse latest Browse all 2029

Trending Articles