Intelligent CISO Issue 33 | Page 22

The cloud agnostic service continuously detects hidden , misconfigured and unused cloud permissions – improving security by providing a consistent approach to cloud least privilege .
infographic
CyberArk has announced its intent to significantly reduce risk and improve visibility and security for businesses .

CYBERARK LAUNCHES AI- POWERED SERVICE TO REMOVE EXCESSIVE CLOUD PERMISSIONS

CyberArk , a global leader in privileged access management , has announced CyberArk Cloud Entitlements Manager , the industry ’ s first privilege-based , AI-powered service designed to strengthen the security of cloud environments . Through continuous monitoring of cloud access , CyberArk enforces least privilege by identifying and removing excessive cloud permissions that can leave organisations vulnerable – significantly reducing risk and improving overall visibility and security .
According to an ESG survey , over-permissioned accounts and roles is the top-cited cloud service misconfiguration detected and overly permissive privileges is the most commonly cited type of cybersecurity attack against cloud applications and services experienced over the last 12 months . As organisations rapidly scale cloud deployments and adopt advanced services to digitally transform their business , the creation of human , application and machine identities is accelerating . Access permissions for these identities are often granted by default , based on group or role , and can go unused or have more entitlements than they actually need .
CyberArk Cloud Entitlements Manager is a key component of CyberArk ’ s Identity Security strategy that starts with Zero Trust and uses AI to understand context and intent in order to properly assess risk and take appropriate actions . Because all identities can become privileged under certain conditions , traditional approaches to managing and securing identities have become obsolete . This is especially true in the cloud where identities and their permissions are constantly being added or changed .
In under an hour , CyberArk Cloud Entitlements Manager can be configured , provide an assessment of exposure levels and deploy granular remediations – quickly delivering exceptional customer value . The cloud agnostic service continuously detects hidden , misconfigured and unused cloud permissions – improving security by providing a consistent approach to cloud least privilege . For cloud , security and Identity and Access Management teams , the service drives increased productivity with a simple , intuitive user experience that includes a centralised dashboard with a single view of permissions across Amazon Web Services ( AWS ), including Amazon Elastic Kubernetes Service ( Amazon EKS ), Google Cloud Platform ( GCP ) and Microsoft Azure environments . u

The cloud agnostic service continuously detects hidden , misconfigured and unused cloud permissions – improving security by providing a consistent approach to cloud least privilege .

22 www . intelligentciso . com