CyberArk announces new features for CyberArk Viewfinity Deliver a privileged account security to the Endpoint

20:35
CyberArk announces new features for CyberArk Viewfinity Deliver a privileged account security to the Endpoint -

Following the acquisition of Viewfinity Q4 2015 CyberArk Viewfinity is now available part of CyberArk Privileged account security Solution. With the new version, version 5.5, organizations would be able to obtain greater privilege management and application control features on a website or software-as-a-service (SaaS) offering based.

CyberArk Viewfinity With v5.5, organizations would be able to benefit from a single management of privileges and improved application control solution to reduce the attack surface while being able to block the progression of attacks by malware , and the balance of business user productivity and corporate security.

new integration with the shared technology platform CyberArk allows all privileged audit logs are stored and reviewed in the center, and new hoses., Customizable reporting capabilities

Improved functionality CyberArk Viewfinity include:

  • cyberark endpoint security greylisting - monitor applications 'gray' - those that are not specifically trusted (whitelist) or blocked (blacklist) -. and implement policies such as restrictive access mode until the request can be further studied
  • Application Catalog - demand catalog displays information about the applications installed on end-user computers managed by CyberArk Viewfinity and enables the rapid discovery of new applications in the system
  • Application Intelligence - provides support for the application of forensic and investigation process . . Aggregated historical chronology is compiled for each application with details such as first seen in the organization, which is installed, the original source and solid shaft
  • Trusted Sources - this ability to privilege management enables system administrators to automatically create applications and privilege elevation control policies based on trusted sources such as System Center Configuration Manager (SCCM), software vendors, and updaters. Trusted sources can be used to automate the creation of privilege policies for more than 0 percent of applications within the organization.

"As malware continues to be a frequently used and successful means to divert the authorities, organizations must realize that the endpoint problem is a problem . privilege, "said Roy Adar, vice president, product management, CyberArk " the fact is, motivated attackers eventually get inside of your network - it is what happens next that matters. the establishment of a foot on the parameters and the escalation of privileges allows attackers to skip terminals, servers, domain controllers until they own the network. CyberArk Viewfinity extends security privilege to endpoint to mitigate those risks without unduly restrictive controls on users. "

Previous
Next Post »
0 Komentar