By Vaibhav Pandya S R.information Security Consultant M.Tech Solutions (India) PVT - LTD
By Vaibhav Pandya S R.information Security Consultant M.Tech Solutions (India) PVT - LTD
• INTRODUCTION TO CYBERARK.
• WHY CYBERARK
• INTRODUCTION TO CYBERARK PAS COMPONENTS
• CYBERARK PAS PRODUCT OVERVIEW.
• CYBERARK USE CASES.
• CYBERARK LICENSING.
• COMPETITIVE ANALYSIS.
• CYBERARK PAS LIVE DEMO.
2
WHAT IS A PRIVILEGED ACCOUNT
• ANY ACCOUNT WHICH HAS FULL RIGHTS ON THE SYSTEM RATHER THAN THE NORMAL
USER IS CALLED AS A PRIVILEGED ACCOUNT.
• EXAMPLES OF PRIVILEGED ACCOUNTS ARE AS FOLLOWS:-
1. ADMINISTRATOR ACCOUNT IN WINDOWS
2. ROOT ACCOUNT IN LINUX/UNIX.
3. SYS OR SA ACCOUNT IN DATABASE.
4. CISCO ENABLE FOR CISCO DEVICES SUCH AS ROUTERS AND SWITCHES.
3
CYBERARK - #1 IN PRIVILEGED ACCOUNT SECURITY
4
5
CYBERARK - PAM MARKET LEADER
6
WHY CYBERARK
7
CYBERARK C3 ALLIANCE
8
INTRODUCTION TO CYBERARK PAS COMPONENTS
9
CYBERARK’S PRIVILEGED ACCOUNT SECURITY SOLUTION
10
CORE PRIVILEGED ACCOUNT SECURITY
Secure storage
▪ Passwords
▪ Audit logs and recordings
▪ Policies
12
DISCOVER, AUDIT AND INTEGRATE
13
CREDENTIAL PROTECTION AND MANAGEMENT
ENTERPRISE
RESOURCES
SERVERS MAINFRAMES
DATABASES APPLICATIONS
NETWORK SECURITY
DEVICES APPLICANCES
PASSWORD SECURE
ROTATION STORAGE
CYBERARK WEB PORTAL WEBSITES/ CLOUD
WEBAPPS INFRASTUCTURE
14
SESSION ISOLATION AND MONITORING
Enterprise Resources
Databases Applications
Privileged Session
× Block credentials from getting out Manager
Network Security
Devices Appliances
15
WAY TO PITCH IN CYBERARK
16
DNA
17
CYBERARK DISCOVERY & AUDIT (DNA)
• Discover all accounts (privileged and non-privileged) from
Windows, Unix, Linux and Mac
• Identify privileged accounts and credentials including:
➢ Embedded & hard-coded credentials in WebSphere,
WebLogic, IIS servers and Ansible playbooks
➢ Golden Ticket attack risk
➢ SSH keys
➢ Password hashes and password length
➢ Insecure privilege escalations in Unix
➢ AWS IAM Users, Access Keys and EC2 Key pairs
• Easily view results in the Executive Summary Dashboard
• Enhance insight with visual maps of password hashes and
SSH key trust relationships
• Gain visibility without impacting performance
• Requires no installation
• Consumes very low bandwidth
CYBERARK USE CASES
20
PROBING QUESTIONS TO CUSTOMERS
21
THANK YOU ☺
22