CyberArk announces significant improvements to our session management capabilities. New, modern capabilities help CyberArk Privilege Cloud customers on the CyberArk Identity Security Platform improve the security and operational efficiency of session management by enabling access to a wider range of targets, improving user experience and reducing total cost of ownership (TCO) for CyberArk PAM programs.
With this release, customers benefit from modernized session management and secure access to targets including databases, Windows, Linux and Kubernetes. Customers can now provision access with either vaulted credentials or just in time access with Zero Standing Privileges (ZSP), all with a quick installation of a light-weight connector.
Release Highlights
Deliver measurable risk reduction:
- Centrally provide secure, VPN-less, native access with either vaulted credentials or access with ZSP. The following systems are supported:
- Remote VPN-less access, without direct inbound connectivity.
- Session isolation, monitoring and auditing, including SSH commands and SQL audits.
To enable access with vaulted credentials to infrastructure, customers use the existing access controls and user permissions from CyberArk Privilege Cloud on the CyberArk Identity Security Platform.
Improve the operational efficiency of privileged session management:
- Up to sixteen times reduced footprint cost of session isolation with a light-weight connector.
- Reduced TCO, near-zero-downtime for upgrades and built-in high availability and load balancing.
- Native, VPN-less access with IDP-based authentication to a wide range of targets and enforcing a variety of multi-factor authentication (MFA) methods, improving user experience.
- Easier administration and authentication when accessing databases and Kubernetes with a new, purpose-built CLI tool and SDK - ArkCLI.
- Added ZSP access to cloud VMs with fully-qualified domain name (FQDN).
- Real time updates about the service and data center availability in the new Status Page.
Complete Privileged Access Protection
To learn more about the modern session management capabilities with CyberArk PAM visit CyberArk documentation.