CyberArk Launches AI-Powered Service to Remove Excessive Cloud Permissions

by | Nov 11, 2020

Data and AI for India, artificial intelligence, AI career

CyberArk a global leader in privileged access management, announced CyberArk Cloud Entitlements Manager, the industry’s first privilege-based, artificial intelligence-powered service designed to strengthen the security of cloud environments. Through continuous monitoring of cloud access, CyberArk enforces least privilege by identifying and removing excessive cloud permissions that can leave organizations vulnerable – significantly reducing risk and improving overall visibility and security.

According to a recent ESG survey, over-permissioned accounts and roles is the top-cited cloud service misconfiguration detected and overly permissive privileges is the most commonly cited type of cybersecurity attack against cloud applications and services experienced over the last 12 months.1 As organizations rapidly scale cloud deployments and adopt advanced services to digitally transform their business, the creation of human, application and machine identities is accelerating. Access permissions for these identities are often granted by default, based on group or role, and can go unused or have more entitlements than they actually need.

CyberArk Cloud Entitlements Manager is a key component of CyberArk’s Identity Security strategy that starts with Zero Trust and uses artificial intelligence to understand context and intent in order to properly asses risk and take appropriate actions. Because all identities can become privileged under certain conditions, traditional approaches to managing and securing identities have become obsolete. This is especially true in the cloud where identities and their permissions are constantly being added or changed. It’s critical for organizations to have a consistent strategy for protecting access by a range of human, application and machine identities, and the services they consume.

“Cloud adoption has massively accelerated, but as new environments and cloud services are deployed, thousands of identity-based permissions are created – many of which go overlooked,” said Chen Bitan, chief product officer, CyberArk. “If not properly configured or managed, these identities create a pathway for attackers to gain privileged access and ultimately compromise an entire cloud environment. CyberArk Cloud Entitlements Manager helps organizations take back control of cloud security by transforming how these permissions are secured and managed while also delivering unprecedented time to value and operational efficiency.”

In under an hour, CyberArk Cloud Entitlements Manager can be configured, provide an assessment of exposure levels and deploy granular remediations – quickly delivering exceptional customer value. The cloud-agnostic service continuously detects hidden, misconfigured and unused cloud permissions – improving security by providing a consistent approach to cloud least privilege. For cloud, security and Identity and Access Management teams, the service drives increased productivity with a simple, intuitive user experience that includes a centralized dashboard with a single view of permissions across Amazon Web Services (AWS), including Amazon Elastic Kubernetes Service (Amazon EKS), Google Cloud Platform (GCP) and Microsoft Azure environments.

As part of CyberArk’s growing SaaS portfolio, which also includes Idaptive, Alero, Privilege Cloud and Endpoint Privilege Manager, Cloud Entitlements Manager builds on the company’s industry-leading privileged access management and IDaaS capabilities to provide unmatched enterprise-wide security intelligence by helping to and reduce the growing risk of cloud permission sprawl while offering incomparable operational simplicity.

Share This Article!

Brian Pereira
Brian Pereira
Brian Pereira is an Indian journalist and editor based in Mumbai. He founded Digital Creed in 2015. A technology buff, former computer instructor, and software developer, Brian has 29 years of journalism experience (since 1994). Brian is the former Editor of CHIP India, InformationWeek India and CISO Mag. He has served India's leading newspaper groups: The Times of India and The Indian Express. Presently, he serves the Information Security Media Group, as Sr. Director, Editorial. You'll find his most current work on CIO Inc. During his career he wrote (and continues to write) 5000+ technology articles. He conducted more than 450 industry interviews. Brian writes on aviation, drones, cybersecurity, tech startups, cloud, data center, AI/ML/Gen AI, IoT, Blockchain etc. He achieved certifications from the EC-Council (Certified Secure Computer User) and from IBM (Basics of Cloud Computing). Apart from those, he has successfully completed many courses on Content Marketing and Business Writing. He recently achieved a Certificate in Cybersecurity (CC) from the international certification body ISC2. Follow Brian on Twitter (@creed_digital) and LinkedIn. Email Brian at: [email protected]
Recommended Posts
Why Landing On The Moon Is Difficult

Landing an uncrewed vehicle on the surface of the moon or any planet is not easy; space institutions have made multiple attempts after seeing their spacecraft crash on the surface.

Similar Articles

Share This