Story image

CyberArk launches SAP-certified privileged access security solution

03 Aug 2018

Privileged access security company CyberArk today announced the availability of its SAP-certified CyberArk Privileged Access Security Solution.

The solution can strengthen and extend security across SAP environments, including SAP ERP systems, by protecting against privileged access-related risk and credential compromise.

The CyberArk Privileged Access Security Solution achieved SAP certification as Integrated with SAP NetWeaver technology platform.

It enables organisations to improve operational efficiencies and safeguard critical assets from external attackers and malicious insiders.

With more than 90% of the Forbes Global 2000 relying on SAP applications to run their organisations, credentials for these applications and systems are sought out by attackers to gain access to business-critical information and assets. 

This certification extends CyberArk’s existing SAP integrations, which are available to customers on the CyberArk Marketplace.

SAP is also a new member of the C3 Alliance, CyberArk’s global technology partner program. 

“The CyberArk Privileged Access Security Solution enables SAP-focused organisations to move forward with the confidence that only an SAP-certified solution delivers,” says CyberArk global business development executive vice president Adam Bosnian.

“CyberArk enhances existing risk management and compliance initiatives in SAP environments and extends privileged access security, a critical layer of IT security, to essential business systems.

“It delivers a solution for privileged access security that can scale effectively with these organisations.”

The CyberArk Privileged Access Security Solution enables organisations to:

  • Manage and secure SAP credentials: Organisations can strengthen their security posture and improve operational efficiencies by onboarding accounts into CyberArk’s encrypted centralised repository. With CyberArk, they can also automate password rotation and enable multi-layered privilege access security control across the SAP stack – from the application layer to databases, operating system and servers.  
  • Reduce privileged access security risk: Organisations can quickly detect and halt suspicious activity by monitoring SAP privileged user activity. CyberArk complements SAP’s security controls by managing, protecting and controlling the use of privileged accounts. CyberArk provides a consistent approach to reducing privileged access security risk across the entire enterprise for SAP solutions and other high-value applications and infrastructure.  
  • Meet compliance requirements: Organisations can easily demonstrate compliance with internal enterprise policies and various industry regulations – including SOX, PCI DSS, GDPR and more – with complete visibility into SAP privileged account controls and activity records.
Aerohive launches guide to cloud-managed network access control
NAC for Dummies teaches the key aspects of network access control within enterprise IT networks and how you can secure all devices on the network.
Sungard AS named DRaaS leader by Forrester
It was noted for its disaster-recovery-as-a-service solution’s ability to “serve client needs at all stages of their need for business continuity.”
Gartner: The five priorities of privacy executives
The priorities highlight the need for strategic approaches to engage with shifting regulatory, technology, customer and third-party risk trends.
emt Distribution adds risk intelligence vendor
Flashpoint has signed emt Distribution to provide channel partners in Oceania and South East Asia a solution for illicit threat actor communities.
CrowdStrike: Improving network security with cloud computing solutions
Australian spending on public cloud services is expected to reach $6.5 billion this year according to Gartner
Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.