9 - 11 October 2018 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2017
Zoom product LOGO_CyberArk Endpoint Privilege Manager

CyberArk Endpoint Privilege Manager

LOGO_CyberArk Endpoint Privilege Manager

CyberArk Endpoint Privilege Manager

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Send
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitor Database.

An error has occurred.

Enforcing privilege security on both endpoints and critical servers is a fundamentally important part of any organization’s security program. CyberArk Endpoint Privilege Manager is a comprehensive solution that enables organizations to block and contain attacks on endpoints and servers to reduce the risk of information being stolen or encrypted and held for ransom.

A powerful combination of privilege management and application control reduces the risk of malware infection on Windows and Mac endpoints. Unknown applications can run in a restricted mode to contain threats while maintaining productivity, and behavioral analysis identifies and blocks credential theft attempts. These critical prevention and protection technologies are deployed as a single agent to strengthen your existing endpoint security.

Features

  • Automated policy creation generates privilege elevation and application control policies based on trusted sources
  • Privilege management for IT administrators limits which privileges, scripts and commands administrators may use on Windows machines based on role
  • On-demand privilege elevation automatically provides users with the privileges necessary to run trusted applications and carry out authorized tasks
  • Application control on endpoints and servers prevents known malicious applications from entering the environment and reaching critical servers
  • Integration with Check Point, FireEye and Palo Alto Networks solutions enable the automated analysis of unknown applications
  • “Greylisting” enables unknown applications to safely run in restricted mode
  • Behavioral analysis helps organizations detect and block attempted theft of Windows credentials and those stored by popular web browsers
  • Threat detection capabilities scan the original source and if found malicious will proactively scan the environment for other instances
  • Automated policy updates block malicious executables from propagating and running on all computers
  • Ransomware Protection lets you define filetypes that are permitted on a writing target. The agent will detect and stop unauthorized access to protected file types even if an attacker uses scripts.
  • Deployment options are Microsoft Group Policy (GPO), On Premise Server and SaaS

Benefits

  • Provide an additional critical layer of protection when an attack evades traditional perimeter and endpoint security controls
  • Protect against malware and non-malware based attacks with comprehensive security on the endpoint
  • Leverage a unique combination of technologies to protect against, block and contain attacks on the endpoint, reducing potential damage to the business
  • Strengthen the prevention, protection and detection capabilities of existing endpoint security solutions
  • Prevent Windows servers, - desktops and Macs from credential theft by stopping unauthorized, lateral movement and privilege escalation through stolen credentials (or hashes)
  • Prevent users from installing unsanctioned applications that cause workstation instability, resulting helpdesk calls and increased support costs
  • Enable removal of local administrator rights without reduced user productivity and increased helpdesk calls
  • Ease deployment and management with single-agent installation, automated policy creation and choice of delivery methods
  • Deploys within a few days depending on size of environment and number of applications
  • An intuitive GUI and in most cases self explaining controls will allow a quick integration

Disclaimer: All mentioned product- and company names are trademarks™ or registered® trademarks of their respective holders. All specifications are subject to change without notice.

Rapid7

LOGO_Rapid7

Logopoint

LOGO_Logopoint

Spyrus

LOGO_Spyrus

The Promisec Promise: Integrity Across all your Endpoints!

LOGO_The Promisec Promise: Integrity Across all your Endpoints!

Order your it-sa ticket online in our TicketShop. Save your ticket now!



top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.