21.01.2016 Views

The GSN 2015 Digital Yearbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

information collected by big data analytics solutions.<br />

With proactive controls and threat detection, CyberArk<br />

Privileged Threat Analytics is the only analytic solution<br />

able to detect malicious activity and actively respond by<br />

invalidating account access. This enables incident response<br />

teams to quickly contain threats by invalidating<br />

stolen credentials to stop an attacker from continuing<br />

their attack. By reducing an attacker’s window of opportunity<br />

and residual damage through real-time alerts on<br />

in-progress attacks, CyberArk Privileged Threat Analytics<br />

improves organizations’ effectiveness by enabling response<br />

teams to identify anomalous privileged activities<br />

and prioritize only the most critical security incidents.<br />

Privileged Threat Analytics is part of the CyberArk Privileged<br />

Account Security Solution. CyberArk delivers regular<br />

updates to ensure customers can proactively take<br />

advantage of new features including new algorithms that<br />

are added to the analytic engine. <strong>The</strong> R&D and Cyber-<br />

Ark Lab teams are constantly researching attacks in the<br />

wild and building new detection capabilities and algorithms<br />

to detect the latest attacks. Today, CyberArk has a<br />

customer base of more than 1,900, including 40 percent<br />

of the Fortune 100, 19 percent of the Global 2000 and<br />

17 of the world’s top 20 banks, and includes leading<br />

enterprises in a diverse set of industries, such as energy<br />

and utilities, financial services, healthcare, manufacturing,<br />

retail, technology and telecommunications, as well<br />

as government agencies. CyberArk serves customers in<br />

more than 65 countries and has more than 200 global<br />

partners.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.cyberark.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Main page for Privileged Threat Analytics information,<br />

including data sheets:<br />

http://www.cyberark.com/products/privilegedaccount-security-solution/privileged-threatanalytics/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Liz Campbell, Sr. Manager,<br />

Corporate Communications<br />

CyberArk<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (617) 558-2191<br />

cell: (781) 820-9840<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

liz.campbell@cyberark.com<br />

81

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!