Product Updates: CyberArk Viewfinity Integrates Privilege Management with Application Control

cryptzone_KeyboardCyberArk has announced new capabilities for CyberArk Viewfinity that deliver privileged account security to the endpoint. With Viewfinity v5.5, the identity-based security solutions vendor hopes to offer  customers “an enhanced, single privilege management and application control solution”  will “reduce the attack surface while being able to block the progression of malware-based attacks, and balance business user productivity and enterprise security,” according to a statement.

Following CyberArk’s acquisition of Viewfinity in Q4 2015, CyberArk Viewfinity v5.5 is now available as part of the CyberArk Privileged Account Security Solution, available as an on-premises or software-as-a-service (SaaS)-based offering. New integration with the CyberArk Shared Technology Platform enables all privileged audit logs to be stored and reviewed centrally, as well as new customizable reporting capabilities.

CyberArk Viewfinity users will have access to several new features including “grey listing,” an application catalog for effective monitoring of applications on a network, and new application intelligence features, and “Trusted Sources” a privilege management capability that allows SysAdmins to automatically create application control and privilege elevation policies based on “Trusted Sources” such as System Center Configuration Manager (SCCM).

Privileged accounts are an easy target for both external attacks and malicious insiders— just take a look at some recent data breaches and chances are high the malicious party used a compromised privileged account to increase their permissions.

These kinds of advanced attacks often start with phishing emails, and according to a study conducted by CryptZone, a campaign of just 10 emails yields a greater than 90 percent chance that at least one recipient’s identity will be compromised.

Due to this common practice Privileged Identity Management (PIM)— the monitoring and protection of super user accounts— has emerged as one of the most important aspects of Identity and Access Management (IAM), and cyber security writ large, today.

“As malware continues to be a frequently-used and successful means for hijacking credentials, organizations must realize that the endpoint problem is a privilege problem,” said Roy Adar, senior vice president, product management, CyberArk. “The fact is, motivated attackers will eventually get inside your network – it’s what happens next that matters. Establishing a foothold on endpoints and escalating privileges enables attackers to jump from endpoints to servers, to domain controllers until they own the network. CyberArk Viewfinity extends privilege security to the endpoint to mitigate these risks without excessively restrictive controls on users.”

Want more on information security? Checkout Solutions Review’s 2016 Buyer’s Guides for SIEM and IAM.

Jeff Edwards
Follow Jeff