cancel
Showing results for 
Search instead for 
Did you mean: 

Secure the keys to your data kingdom

Rachelzhu
Level 1
Employee

Today's attackers increasingly use stolen credentials to access sensitive resources and destroy your last line of defense from ransomware. According to CrowdStrike's Global Threat Report, 80% of cyberattacks leveraged identity-based techniques to compromise legitimate credentials and try to evade detection. Moreover, the report reveals that adversaries are doubling down on stolen credentials, with a 112% year-over-year increase in advertisements for access-broker services identified in the criminal underground.

Businesses face the challenge of protecting not only data from attack, but also the tools used to protect the enterprise. Application integrations create new attack surfaces. We must simplify by using credential management protection that applies to all tools in the enterprise.   

We must have an assume beach mindset because no organization is immune to a breach or attack. Therefore, it's essential to have operations in place to deal with threats as they materialize. With CyberArk’s comprehensive privileged access management, organizations can protect the password by

  • Automating Password rotation with a strong password policy
  • Eliminating the need of sharing built-in accounts password
  • Auditing user's sessions for tracking malicious activities and investigations
  • Storing passwords in a Secure tampered proof Vault

CyberArk and Veritas have developed plugins to guard all NetBackup Appliance interface access: WebUI, SSH, and IPMI. Appliance integration reduces complex identity credentials and provides monitoring capability on data access. This minimizes business risk, improves productivity, and prevents ransom attacks. Additionally, Veritas Appliances provides Network access control only allowing access based on IP addresses.

Rachelzhu_0-1685677594867.png

CyberArk Central Policy Manager (CPM) integrated with Veritas appliance WebUI, SSH, and IPMI interfaces automating credential management to secure and proliferate credential management . In addition, Veritas Flex Appliances' administrators can set password policies to ensure user password changes at the set time and complexity.

 Privileged Session Manager (PSM) is a CyberArk component that enables you to initiate, monitor, and record privileged sessions and usage of administrative and user accounts using the passwords stored in the vault for web users. This starts up a "Remote Desktop" connection ex: Flex Appliance WebUI or ssh to WORM storage or a NetBackup primary or media server that will record the entire session.

You can download the CyberArk Veritas integration from CyberArk Marketplace Integration and Tools. By searching Veritas, you will see the plugins, and the number of plugins will be increasing when Veritas and CyberArk team are keeping our development work. Download and import the zip file. We have Flex Appliance API which is the web interface, SSH to worm instance, SSH to primary and media instance and SSH to Flex Shell. We support all Flex Interfaces.

Seeing is believing, check this demo and secure your data today.