{"id":644,"date":"2018-09-10T14:51:25","date_gmt":"2018-09-10T10:21:25","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=644"},"modified":"2019-05-21T12:39:48","modified_gmt":"2019-05-21T08:09:48","slug":"cyberark-pas-architecture","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2018\/09\/10\/cyberark-pas-architecture\/","title":{"rendered":"CyberArk Privileged Account Security Architecture"},"content":{"rendered":"<p>Privileged accounts on a system possess higher authorizations and control. These accounts pose a higher risk if they are compromised. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Identity_management\">Privileged Identity Management<\/a> solutions aim to address this by providing security and control over these accounts. <a href=\"https:\/\/www.cyberark.com\/\">CyberArk<\/a> is a major provider that offers privileged account security and is backed by a <a href=\"https:\/\/patents.google.com\/patent\/US6356941\">patented vaulting technology<\/a>. CyberArk enables organizations to secure, provision, manage, control and monitor activities associated with privileged accounts.<\/p>\n<p>The following presentation describes privileged account security and the architecture of a CyberArk implementation. The various components of the CyberArk architecture and their functionalities are also discussed.<\/p>\n<p><iframe loading=\"lazy\" title=\"ENH iSecure CyberArk Architecture\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/_UmdSv0ucRQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privileged accounts on a system possess higher authorizations and control. These accounts pose a higher risk if they are compromised. Privileged Identity Management solutions aim to address this by providing security and control over these accounts. CyberArk is a major provider that offers privileged account security and is backed by a patented vaulting technology. CyberArk [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18,8,16],"tags":[93,84],"class_list":["post-644","post","type-post","status-publish","format-standard","hentry","category-cyberark","category-identity-governance","category-technology","tag-architecture","tag-cyberark"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=644"}],"version-history":[{"count":1,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/644\/revisions"}],"predecessor-version":[{"id":645,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/644\/revisions\/645"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}