sb-au logo
Story image

CyberArk launches SAP-certified privileged access security solution

03 Aug 2018

Privileged access security company CyberArk today announced the availability of its SAP-certified CyberArk Privileged Access Security Solution.

The solution can strengthen and extend security across SAP environments, including SAP ERP systems, by protecting against privileged access-related risk and credential compromise.

The CyberArk Privileged Access Security Solution achieved SAP certification as Integrated with SAP NetWeaver technology platform.

It enables organisations to improve operational efficiencies and safeguard critical assets from external attackers and malicious insiders.

With more than 90% of the Forbes Global 2000 relying on SAP applications to run their organisations, credentials for these applications and systems are sought out by attackers to gain access to business-critical information and assets. 

This certification extends CyberArk’s existing SAP integrations, which are available to customers on the CyberArk Marketplace.

SAP is also a new member of the C3 Alliance, CyberArk’s global technology partner program. 

“The CyberArk Privileged Access Security Solution enables SAP-focused organisations to move forward with the confidence that only an SAP-certified solution delivers,” says CyberArk global business development executive vice president Adam Bosnian.

“CyberArk enhances existing risk management and compliance initiatives in SAP environments and extends privileged access security, a critical layer of IT security, to essential business systems.

“It delivers a solution for privileged access security that can scale effectively with these organisations.”

The CyberArk Privileged Access Security Solution enables organisations to:

  • Manage and secure SAP credentials: Organisations can strengthen their security posture and improve operational efficiencies by onboarding accounts into CyberArk’s encrypted centralised repository. With CyberArk, they can also automate password rotation and enable multi-layered privilege access security control across the SAP stack – from the application layer to databases, operating system and servers.  
  • Reduce privileged access security risk: Organisations can quickly detect and halt suspicious activity by monitoring SAP privileged user activity. CyberArk complements SAP’s security controls by managing, protecting and controlling the use of privileged accounts. CyberArk provides a consistent approach to reducing privileged access security risk across the entire enterprise for SAP solutions and other high-value applications and infrastructure.  
  • Meet compliance requirements: Organisations can easily demonstrate compliance with internal enterprise policies and various industry regulations – including SOX, PCI DSS, GDPR and more – with complete visibility into SAP privileged account controls and activity records.
Story image
SMBs seeking service providers in face of rising cyber threats
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option.More
Story image
Report: Rushing into cloud migration directly related to security issues
A new report from Radware highlights the impact of COVID-19 on organisations compelled to digitally transform in order to maintain business continuity. More
Story image
AFP arrests two men with ties to Australian SMS phishing scheme
“The success of Operation Genmaicha has prevented further Australians from seeing their hard-earned savings siphoned off to criminal entities.”More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
Video: 10 Minute IT Jams - Who is Bitglass?
Today, Techday speaks to Bitglass senior director of marketing Jonathan Andresen, who discusses insider attacks and the best solutions and practices to employ to protect organisations and employees.More