Cyberark Vault Features
Cyberark Vault Features
Cyberark Vault Features
Cyber-Ark lesson
2
Tightly Coupled Layers of Security
• US Patent #6,356,941
• Unparalleled centralized secure storage and sharing platform
• Securing data from end-to-end using multiple security layers
Cyber-Ark
LAN, WAN,
Vault Server INTERNET
3
End-to-end Security
1. VPN
2. Firewall
3. Data Access Control
4. Authentication (including PKI and Token
Based).
5. Encryption
6. Content Inspection
4
Vault Competition -
A Handful of Partial Technologies
VPN Firewall
Vs.
Access Encryption
Control
Vault
Compression Access Control
5
Hardened Machine
• Dedicated server
• Remove potentially vulnerable services
• Use “safe configuration” for remaining
services
6
Firewall
• Dedicated firewall
• Cannot be configured
• Code isolation
Cyber-Ark Protocol
Only
7
VPN
8
Encryption Highlights
10
Data Access Control
Back
13
Administrators –
No access to data
Back
14
Build-in Users & Groups
• Administrator
• Auditor (Auditors)
• Backup (Backup Users)
• Batch
• DR (DR Users)
• Master
• NotificationEngine (Notifition Engines)
• Operator (Operators)
15
Manual Security
• Confirmation
• Delay
• Time Limitations
16
Geographical Security
• Network Area
17
Additional Security layers
18
Cyber-Ark Vault Secured
Environment
20
Q&A