ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:CyberArk

  • Taming Vault Sprawl with Modern Secrets Management

    In CyberArk’s recent webinar, John Walsh, senior product marketing manager; Joe Garcia, senior solutions engineer; Uzi Ailon, vice president of DevOps and Damon McDougald, Accenture global digital identity lead, discussed why teams are seeking a modern SaaS approach to scalable secrets management.

  • Cloud Security Your Developers Will Love

    As organizations move to the cloud, they seek consistent, developer-friendly controls that secure their access to cloud-based workloads and SaaS applications without slowing their productivity down. Access this e-book to learn more.

  • Best Practices for Securing Cloud Identities

    This white paper, leveraging the CyberArk Blueprint, presents a comprehensive framework for securing cloud identities using a holistic approach that includes both human and machine identities and advocates for a practical, risk-based strategy to enhance cloud security postures. Read on now to learn more.

  • CyberArk 2024 Identity Security Threat Landscape Report

    In the last 12 months, 93% of organizations suffered two or more identity-related breaches, research by CyberArk reveals. And in the next 12 months, 47% of businesses expect their identities to grow by three times – opening the door to even more threats. For a deep dive into the state of identity security, read CyberArk's 30-page report.

  • Addressing the NIST Cybersecurity Framework 2.0 with the CyberArk Identity Security Platform

    Enjoy an overview of the NIST Cybersecurity Framework 2.0, a framework for managing and mitigating cybersecurity risk. Learn how CyberArk's Identity Security Platform can help organizations comply with various subcategories of the framework, by offering solutions for identity security.

  • Why Just Securing Human Identities Is Not Enough

    If your business leverages digital technology, then securing human access is not enough - attackers will find the weak point. Don’t let it happen to you! In this session you'll learn why you need to secure both your human and machine identities, as well as the applications and workloads they access. Tune in now to learn more.

  • Endpoint Privilege Needs Management and Security – Here’s How to Attain Both

    To help you identify the controls needed to protect endpoints, this whitepaper explores key differences between endpoint privilege management and endpoint privilege security solutions. This whitepaper also explores how CyberArk Endpoint Privilege Manager addresses the criteria that serve both endpoint privilege management and security challenges.

  • Your Biggest Cyber Vulnerability: Local Admin Accounts

    Cybersecurity threats are more prevalent than ever before. Elevated privileges represent a vulnerability that can lead to significant risks and cyberattacks. In healthcare organizations, granting users more privileges than necessary can lead to damaging repercussions, which can compromise patient data integrity and compliance.

  • Cisco Protects the Bridge to the Possible by Holistically Securing Human and Non-human Identities

    Cisco uses the CyberArk Identity Security platform to provide dynamic and one-click privileged access that staff need to deliver and develop services to customers and to accelerate and secure DevOps pipelines with a dynamic secrets management strategy.

  • The Holistic Identity Security Maturity Model

    Enterprise Strategy Group (ESG) surveyed 1,500 identity-related security experts across 16 countries. What did they find? A significant correlation between the completeness of four Identity Security tenets and maturity. Find out how your organization compares to the global survey respondents here.

  • When Every Identity is at Risk, Where Do You Begin?

    Today’s threat landscape is defined by three realities: new identities, new environments and new attack methods. As a result, every organization should expect a rise in identity-based cyberattacks. To defend against evolving threats, every identity must have the right level of intelligent privilege controls. Download this eBook.

  • Why EDR Isn’t Enough to Stop Cyberattacks

    In this whitepaper, you'll discover the limitations of conventional EDR tools when protecting against endpoint attacks, how CyberArk Endpoint Privilege Manager fills security gaps where EDR solutions fall short, and why CyberArk Endpoint Privilege Manager is a foundational component for endpoint identity security.

  • 6 Core Principles for Establishing DevOps Security at Scale

    Disjointed DevOps security systems and practices can slow down CI/CD pipelines, frustrate developers, and lead to risky workarounds. You and other security leaders know that DevOps needs a new approach to security. This eBook details 6 guiding principles for enabling DevOps security at scale. Download the DevOps security eBook here.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.