Enterprise Password Vault®

Features & Benefits

Security and Audit Come First

  • Uses CyberArk’s patented, ICSA certified Vaulting Technology®, which employs multiple built-in layers of security to protect privileged credentials

  • Tamper proof audit logs and session monitoring for audit integrity

  • Customizable “request workflows” for credential access approval including dual controls, integration with helpdesk ticketing systems and multiple additional parameters

  • Flexible password policy management including password aging, complexity, versioning policy and archiving

  • Out-of-the-box support for multi-factor authentication systems

  • Automatic policy enforcement for the lifecycle of privileged accounts with the flexibility to easily enforce granular policies for specific compliance or business unit requirements

Fast Time to Value and Ongoing Operational Efficiency

  • Automated privileged identity management including discovery and provisioning, policy-based password changes, and access controls

  • Out-of-the-box management of privileged credential access to over 100 operating systems, databases, firewalls, network devices, virtual environments, websites and cloud-based applications

  • Extensible support for additional target systems with unique plug-in architecture for fast integration

  • Automated password verification and reconciliation to minimize operational and incident response delays

Enterprise-Proven Scalability and Manageability

  • Scalable to manage hundreds of thousands of privileged accounts

  • Central policy management with distributed enforcement points for multisite and segmented network deployments

  • Built in disaster recovery and high availability

  • Out of the box integration with enterprise infrastructure and security solutions including:

    • Directory services

    • Identity management solutions

    • Authentication systems

    • Vulnerability scanners

    • Security information and event management systems

    • Helpdesk ticketing and workflow, ticketing & workflow, systems

Easy on the Users

  • Intuitive, role-based web interface

  • Scheduled, pre-built audit reports on credential access and use and; policy compliance

  • Access privileged credentials from mobile devices including credential requests and workflow approvals

  • Direct connection to managed devices for users, eliminating the need to copy/paste privileged credentials

Integrated with CyberArk Privileged Account Security Solution

  • CyberArk Shared Technology Platform delivers scalability, high availability and centralized management and reporting

  • Out-of-the-box integration with Privileged Account Security products provides complete management, monitoring, recording and secure single-sign-on for privileged accounts