As an Advanced CyberArk partner we have completed 4,100 days of CyberArk services.
“We are delighted to welcome CyberIAM to Advanced Partner status in the CyberArk Partner Network. This is a notable step, reflecting substantial investment and commitment from CyberIAM’s consultancy team in obtaining valuable and demonstrable skills in the privileged access management discipline. Congratulations to the CyberIAM team and welcome to our elite partner community.”
Miles Rippon,
channel director EMEA
Where it all began
When CyberIAM opened its doors almost 4 years ago the Privileged Access Management (PAM) market leader, CyberArk, was one of our very first vendor partners. CyberIAM’s first PAM project was in fact CyberArk’s largest global implementation.
Since then CyberIAM has helped various clients to manage and secure their privileged accounts with CyberArk’s PAM technologies. Our team has worked hard over the years to deliver successful projects for our enterprise customers. We have now completed 32,800 hours of CyberArk implementations which equates to 18.5 years of implementation work.
The CyberIAM team has worked on a range of CyberArk projects across various industry sectors, including financial services, retail and healthcare, integrating CyberArk PAM solutions into the client’s existing infrastructure. Working within defined security controls, CyberIAM has helped to vastly improve the client’s security posture, whilst also meeting compulsory audit requirements in the process.
Our most recent CyberArk success project
One of CyberIAM’s recent CyberArk projects was with a global investment client, involving the secure management of thousands of privileged accounts across a variety of different operating systems, network devices and database platforms. In addition, these accounts needed to be set up and managed for shared, role-based access by users across various platform teams, with:
- Automated password management
- Session recording
- Comprehensive reporting capability
CyberIAM greatly improved the client’s security posture, minimising the risk of privileged accounts being compromised and used to gain unauthorised access to systems and sensitive data.
The technical skills and experience of our team during the implementation was key to the project’s success. However, CyberIAM’s business services also played a very important role during the onboarding process of the project, by carrying out an extensive in-depth analysis of:
- Existing processes
- Account inventories
- Requirements gathering
The insights from this analysis were used to create a range of documentation for the client, concerning sustainability, training, testing and user communication & adoption. The business analysis and process work is critical to the success of any PAM programme.
How we differ from our Competitors
One recurring scenario we seem to find with all our newly engaged clients is that CyberArk is effectively being used only as a password Vault and so it is a very expensive password vault.
The second scenario is that accounts are onboarded as static passwords with no automatic password management which provides no additional security. Users could retrieve a password, pop it down on a post-it note and not have to use CyberArk again. This post-it note is then shared around the team, which presents a major security issue as there is no logging of who accessed the system or any approval that the user can use that account.
By working alongside our clients, we can very quickly help integrate CyberArk’s many other modules such as Privileged Session Manager, Central Policy Manager and Privileged Session Manage for SSH, to provide credential and session isolation, automatic credential rotation and management and provide monitoring and recording of privileged sessions across many, different platforms.
Do you have a bespoke application that has credentials which need to be managed? Our team of developers can create custom connectors for you to ensure that these credentials are not left behind in your privileged access management journey.
Do you have a lot of embedded credentials in scripts and applications, then we can work with your application teams to remove these and reduce the risk of exposure of these credentials by integrating your applications with Application Access Manager.
Alongside the expanding technology of your solution, our specialist Business Services team can work with your support and application teams to gain an understanding of how privileged access is granted, analysing the current model and advising on how this can be improved.
This could be completed by reducing the number of privileged accounts by adopting a Role-Based Account Model. A Role-Based model moves away from individual accounts to generic accounts which can be used by your teams and accessed through CyberArk. An alternative approach is by designing new work flows for requesting and issuing privileged access and producing sustainability documentation to ensure that the new, improved workflows can be sustained and used for years to come.
The CyberArk solution has now become more than just an expensive password vault…
Where are we now.
We, at CyberIAM, have some of the best CyberArk specialists with years of experience across many different sectors. Their passion is to provide REAL privileged access management solutions to our clients. Installing the CyberArk Vault is only the first step, so we will turn your expensive password vault into a comprehensive, enterprise-wide, privileged access management solution.
As a result of years of hard work and customers success, CyberIAM are now well positioned as one of just two CyberArk Advanced Partners in the UK, with a team of 14 CyberArk certified specialists. We are currently preparing to work on some exciting new CyberArk PAM projects and are committed to delivering successful business & security outcomes for these enterprise clients.
If you would like to speak with the CyberIAM PAM team, please contact us at:
Info@cyberiam.com