CyberArk
Public | |
Industry | Software |
Founded | 1999 |
Headquarters | Newton, Massachusetts, USA |
Key people | Alon N. Cohen, Founder, former Chairman and CEO |
Products | Privileged Account Security |
Revenue | $160.81 million (2015) |
$33.22 million (2015) | |
$25.79 million (2015) | |
Number of employees | 700 (2015) |
Website | www.CyberArk.com |
CyberArk is an information security company offering Privileged Account Security. The company's technology is utilized primarily in the financial services, energy, retail and healthcare markets. As of November 2016, CyberArk had nearly 2,500 customers, including over 50 Fortune 100 companies and approximately 15% of the Global 2000.[1] The company has offices in the US, Israel, UK, France, Germany, the Netherlands, and Singapore, with local sales presence in more than 20 countries.
History
CyberArk was founded in Israel in 1999 by Alon N. Cohen and current CEO Udi Mokady,[2] who assembled a team of security engineers who implemented the digital vault technology (U.S. Patent 6,356,941). This technology (also known as network vault, and branded as The Digital Vault) surrounds data with eight layers of security within an existing network perimeter, creating a central repository to share and store proprietary or confidential data. Digital Vault still serves as a foundation for CyberArk's privileged account security solutions.[3]
In June 2014, CyberArk filed for an IPO with the Securities and Exchange Commission, listing 2013 revenues of $66.2 million.[4] CyberArk became a public company the same year, trading on the NASDAQ as CYBR.[5] In 2015, CyberArk announced plans to acquire the privately held Massachusetts-based company Viewfinity which specialized in privilege management and application control software. The deal was intended to help CyberArk offer more complete security solutions.[6]
Products
The company rebranded its product portfolio as CyberArk Privileged Account Security Solution in 2014.[7] The modular software package includes features that secure, manage and monitor privileged accounts across OT/SCADA environments, either on-premises or in the cloud. Components in the package can be utilized singly or in combination to manage operating systems, databases, applications, hypervisors, network devices, or security appliances. Products include:
- Enterprise Password Vault to protect privileged credentials.
- Privileged Session Manager to isolate, control, and monitor user access as well as activities for critical UNIX, Linux, and Windows-based systems, databases, and virtual machines.
- Privileged Threat Analytics to analyze user behavior and alert incident response teams about malicious activity.
- Application Identity Manager to eliminate hard-coded credentials such as passwords or encryption keys from applications, service accounts or scripts.
- On-Demand Privileges Manager to control and continuously monitor the commands super-users run.
- SSH Key Manager to securely store, rotate and control access to SSH keys to protect privileged accounts.
References
- ↑ "CyberArk F-1 filling with SEC".
- ↑ SearchCIO "Congressman Prepares for Cyberwar, Calls on IT Experts," July 2014
- ↑ "Website:CyberArk Shared Technology Platform".
- ↑ "24/7 Wall St: CyberArk Files for IPO: New Data Security Growth".
- ↑ "Bloomberg: CyberArk Breaks Israel's Security IPO Silence With Surge".
- ↑ "After buying Viewfinity for $30.5M, CyberArk is the newest underdog Israeli unicorn". geektime.com. 2015-10-07. Retrieved 2016-05-21.
- ↑ "Website:Privileged Account Security Solution".
External links
- Official CyberArk website
- Wall St. Journal, "The Biggest Cybersecurity Threat Just May Be Your Own Staff," June 2012
- Wall St. Journal, "Malware Targets Vulnerable Admin Accounts," June 2012
- Whitepaper "Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53"
- Analyst Research "Kuppinger & Cole Product Report: Privileged Identity Management 2011"
- Redmond Magazine, "Review: Cyber-Ark Privileged ID Management Suite," April 2011
- CSO Magazine, "Too much access? Privileged Identity Management to the rescue," November 2010