SINGAPORE – Impact Live 2020 – 22 July 2020 – CyberArk, the global leader in privileged access management, has kicked-off CyberArk Impact Live 2020, where CyberArk Chairman and CEO Udi Mokady outlined the company’s plan to develop an expanded approach to securing identities – one with privileged access management at its core.
Building on the recent acquisition of Idaptive, CyberArk laid out an Identity Security strategy that starts with Zero Trust and uses artificial intelligence to understand context and intent. This approach will help organizations dramatically reduce risk while providing a seamless user experience that will securely enable the business and support any device, application or user — regardless of role or location.
“In today’s mobile, digital and cloud world, all identities can become privileged under certain conditions. If not properly secured, they can open doors for attackers to execute increasingly targeted attacks,” Mokady said during his keynote. “Because of this new reality, the traditional approach to managing and securing identities has become obsolete. The incorporation of the Idaptive technology helps CyberArk extend its foundational strengths in privileged access management, a critical layer to delivering a security-first strategy for protecting access by a range of human, application and machine identities, and the services they consume.”
CyberArk Adds Support for Idaptive Multi-Factor Authentication
As a first step, CyberArk today announced the ability to leverage Idaptive Multi-Factor Authentication (MFA) across CyberArk products and services. While incorporating MFA in front of a privileged access management solution is a security best practice, Idaptive MFA adds risk-aware, intelligent and passwordless identity assurance controls that will offer CyberArk customers a streamlined, best-in-class authentication experience for access via the console.
The Idaptive solution uses machine learning to build a baseline profile for each identity, using specific contextual attributes that include location, system, network and time of access requests. It then assigns risk to each access request and generates dynamic policies that recognize and proactively act on risky access activity. This AI-powered approach eliminates friction that comes from repetitively requesting re-authentication every time a user attempts to access a system – balancing the requirements of a high degree of identity assurance with the desire to provide an excellent end user experience.
More from CyberArk Impact Live
The 14th annual CyberArk Impact event offers an immersive digital experience this year. With more than 10,000 registered attendees and over 40 keynotes, breakout and training sessions, Impact Live is designed to help attendees develop their cybersecurity expertise and provide in-depth training on privileged access management and Identity Security solutions and techniques.
Session highlights include:
- Identity Security Vision — Chen Bitan, General Manager Israel and Chief Product Officer, and Archit Lohokare, Vice President of Product Management
- Securing the Remote Workforce in the New Normal – Archit Lohokare, Vice President of Product Management and Gil Rapaport, Vice President, CyberArk Alero
- The World of Credential Theft Malware – Shaked Reiner, Cyber Research Team Leader, CyberArk Labs
To register to attend CyberArk Impact Live and be able to playback sessions on-demand visit: https://vshow.on24.com/vshow/CyberArk/registration/16988