Featured
How Security Teams are Solving Vault Sprawl with a Modern SAAS Solution
Damon McDougald, Global Digital Identity Lead, Accenture | Uzi Ailon, VP DevOps, CyberArk | Joe Garcia, Sr. Solutions Engineer, CyberArk | John Walsh, Sr. PMM, CyberArk
Given the rapidly evolving threat landscape, the importance of a centralized identity security program is vital for both human and machine identities. While other vaults and open-source tools have their merits, these on-premises tools often require costly skills and resources to host and maintain. Organizations may feel stuck supporting the open-source version and dealing with a siloed security experience due to upgrade challenges.
The good news is that you are not alone and there is a migration path to a centralized SaaS secrets management solution that fully integrates with the CyberArk Identity Security Platform. This webinar will demonstrate the steps others have taken to achieve this transition and highlight key security benefits and operational efficiencies that come with it.
Join this webinar to learn:
-The best practices and common pitfalls of moving from an on-premises to a cloud-based solution for managing your secrets and machine identities.
-The benefits of centralizing your secrets management with CyberArk SaaS: Discover how you can reduce the complexity and cost of hosting and maintaining your own secrets management tool, while enhancing your security posture and compliance with CyberArk's SaaS offering.
-How CyberArk SaaS integrates with your DevOps tools and workflows: See how you can leverage CyberArk's APIs and plugins to securely access and rotate your secrets across different environments and platforms while enabling collaboration and automation among your developers and DevOps teams.
All episodes
-
Why Just Securing Human Identities Is Not Enough
Chris Smith, DevSecOps Product Marketing, CyberArk | Jeremy Patton, Senior DevSecOps SME, CyberArk
If your business leverages digital technology – and who doesn’t – then securing human access is not enough, attackers will find the weak point. Don’t let it happen to you! In this session you'll learn why you need to secure both your human and machine identities, as well as the applications and workloads they access, along with approaches leading organizations are taking.
Join us to learn why a battle-tested Identity Security solution with the leading solution for secure cloud access and secrets management is best to deliver cyber-risk reduction across human and machine identities. Flexible dev options help accelerate the deployment of digital technologies across cloud and hybrid environments: a win for security and a win for the business.
-
OSS Changes Got You Down? Could SaaS be the Solution?
John Walsh, Sr. Product Marketing Manager, CyberArk | Darren Khan, Principal Solutions Engineer, CyberArk
The rise of open source software was fast and furious – “free” software that was easy to try, customize, demo and build on…what could be better? But along the way, the challenges and hard truths with OSS have begun to raise their ugly heads. It requires a large dev staff to maintain and support; can often lead to sticker shock owing to expensive upgrades for key features along with a complex migration or upgrade path; not to mention security and maintenance concerns.
It’s no wonder that companies like Hashicorp have begun pivoting out from underneath their OSS licensing models. But the resultant there is broken trust and misaligned expectations between vendors and customers.
So what’s a company to do? Join CyberArk as we demo potential solutions like SaaS and recommended actions to protect your enterprise as OSS continues to evolve.
-
Live From Black Hat 2024: Securing Machine Identities In 2024 & Beyond
Uzi Ailon, VP, DevSecOps Solutions, CyberArk & Melinda Marks, Practice Director, Application & Cloud Security, ESG
What is the state of machine identity security in 2024, and what are the most important things to know about securing them for the future?
Find out in this fireside chat, where Uzi Alion, VP, DevSecOps Solutions at CyberArk and Melinda Marks, Practice Director, Cybersecurity at Enterprise Strategy Group discuss the biggest risk factors of machine identities in modern enterprises as well as best practices that organizations can leverage to keep their hybrid secrets secure.
Key topics include:
• Defense-in-depth (i.e. self-remediation)
• Lack of visibility and central control of secrets
• Ease of stealing secrets in the cloud
• And moreGrab your spot now to gain expert tips for securing your machine identities in 2024 and beyond!
-
How Security Teams are Solving Vault Sprawl with a Modern SAAS Solution
Damon McDougald, Global Digital Identity Lead, Accenture | Uzi Ailon, VP DevOps, CyberArk | Joe Garcia, Sr. Solutions Engineer, CyberArk | John Walsh, Sr. PMM, CyberArk
Given the rapidly evolving threat landscape, the importance of a centralized identity security program is vital for both human and machine identities. While other vaults and open-source tools have their merits, these on-premises tools often require costly skills and resources to host and maintain. Organizations may feel stuck supporting the open-source version and dealing with a siloed security experience due to upgrade challenges.
The good news is that you are not alone and there is a migration path to a centralized SaaS secrets management solution that fully integrates with the CyberArk Identity Security Platform. This webinar will demonstrate the steps others have taken to achieve this transition and highlight key security benefits and operational efficiencies that come with it.
Join this webinar to learn:
-The best practices and common pitfalls of moving from an on-premises to a cloud-based solution for managing your secrets and machine identities.
-The benefits of centralizing your secrets management with CyberArk SaaS: Discover how you can reduce the complexity and cost of hosting and maintaining your own secrets management tool, while enhancing your security posture and compliance with CyberArk's SaaS offering.
-How CyberArk SaaS integrates with your DevOps tools and workflows: See how you can leverage CyberArk's APIs and plugins to securely access and rotate your secrets across different environments and platforms while enabling collaboration and automation among your developers and DevOps teams.