21.01.2016 Views

The GSN 2015 Digital Yearbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CyberArk<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Continuous Monitoring and Mitigation Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CyberArk Privileged Threat Analytics<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> devastating cyberattacks on Sony Pictures, Anthem<br />

and U.S. Office of Personnel Management (OPM) demonstrate<br />

that today’s cyber security battle has shifted<br />

from the perimeter to inside the IT network. Once<br />

inside a targeted network, attackers immediately seek<br />

to steal and exploit privileged accounts – the gateway<br />

to sensitive and valuable information. Attackers exploit<br />

these accounts to navigate the system, conduct reconnaissance<br />

and escalate privileges – all while impersonating<br />

authorized users. In fact, industry research indicates<br />

that privileged credential exploitation is a signature in<br />

almost every advanced attack. That’s why organizations<br />

need to be proactively monitoring and recording all<br />

privileged activity to ensure attackers – whether they’re<br />

outside hackers or malicious insiders – are not able to<br />

gain access to critical networks, move laterally across<br />

the network to the target goal, or exfiltrate data without<br />

detection. CyberArk Privileged Threat Analytics detects,<br />

alerts and responds to cyber attacks by collecting, monitoring<br />

and analyzing privileged account data, including<br />

activity from the CyberArk Vault, and data feeds from<br />

security information and event management (SIEM)<br />

systems to identify and lessen the most serious of risks.<br />

This solution enables incident response teams to identify<br />

an attack in real time, take the necessary steps to<br />

mitigate the attack and reduce damage. Through industry-leading<br />

analytics, including self-learning, behaviorbased<br />

algorithms, CyberArk enables customers to detect<br />

attacks faster by pinpointing malicious privileged account<br />

activity previously hidden in the sheer volume of<br />

80

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!