CyberArk Privilege Cloud 12.7 Release – Improved User Experience

August 22, 2023 Lilach Faerman Koren

CyberArk Privilege Cloud 12.7 Release – Improved User Experience

The latest version of CyberArk Privilege Cloud, our PAM as-a-service solution, greatly improves user experience. Version 12.7 introduces several new self-service configuration options to enable operational efficiencies for administrators. 

Self-service and Simplification in Privilege Cloud v12.7

New self-service configuration options

Users can now set up additional categories for independent system experience configuration and reduce involvement from CyberArk support.

The following configurations are now available for independent administrative control: 

  • Reports – Users can now define parameters for generated web portal reports and limit the number of records included. They can also display parameters such as columns selection, column names editing, reports colors, description and sort by default. This better granularity improves reporting efforts for PAM admins.

     Learn more about report generation and parameters.

  • Applications List and Application Details UI Configuration – Users can now configure the Applications List and the Application Details pages in the Privilege Cloud Portal. For example, it is now possible to configure which authentications to display on the Applications List page. This facilitates adherence to security best practices that encourage use of multiple authentications for applications and machines.

     Learn more about the applications list.

     Learn more about the application details UI configuration.

  • Performance – Version 12.7 enables shorter load and access times to Account Details, Show Password and Sign-In pages by 30%-50% (on average), improving ease of use.

For more information on these features, please visit:

Release notes and documentation 
Upgrade process for Privilege Cloud Connector  
Component downloads (available in the CyberArk Marketplace) 

Previous Video
From Zero to Immediate Impact with Foundational Endpoint Security
From Zero to Immediate Impact with Foundational Endpoint Security

Without foundational endpoint security in place, you’re leaving the door open for attackers. Learn how to g...

Next Article
CISA CPG Report IDs Top Cybersecurity Steps for SMB Critical Infrastructure Entities
CISA CPG Report IDs Top Cybersecurity Steps for SMB Critical Infrastructure Entities

The No. 1 cybersecurity challenge across U.S. critical infrastructure is that many organizations haven’t ad...