Product
- CyberArk Endpoint Privilege Manager
Tech Stack
- Endpoint Security
- Privilege Management
Implementation Scale
- Enterprise-wide Deployment
Impact Metrics
- Cost Savings
- Customer Satisfaction
- Productivity Improvements
Technology Category
- Cybersecurity & Privacy - Endpoint Security
- Cybersecurity & Privacy - Identity & Authentication Management
Applicable Industries
- Professional Service
- Software
Applicable Functions
- Business Operation
Services
- System Integration
- Training
About The Customer
The customer is an organization that places a high priority on IT security and risk management. They have a dedicated Security Operations Center (SOC) and are focused on reducing the attack surface within their IT environment. The organization values solutions that not only enhance security but also improve operational efficiency. They have a structured approach to managing administrative access and are keen on implementing policies that limit the number of local administrative accounts. The customer is also interested in solutions that can elevate their IT security personnel's profile within the industry.
The Challenge
The organization faced significant risks related to endpoint security, particularly concerning the potential for pass-the-hash attacks and same-account harvesting. The challenge was to reduce the attack surface by removing local administrative rights on workstations, which would minimize the chance of privilege escalation. Additionally, the organization needed a solution that could provide immediate reporting to the Security Operations Center (SOC) in case of an incident. The goal was to enhance overall security while maintaining operational efficiency.
The Solution
The organization implemented CyberArk Endpoint Privilege Manager to address their endpoint security challenges. This tool significantly reduced the risk of pass-the-hash attacks and same-account harvesting by removing local admin credentials on endpoints. The solution also provided immediate reporting capabilities to alert the SOC in case of any incidents. By implementing strict policies, the organization was able to reduce the number of local administrative accounts by 98%, thereby drastically reducing the attack surface. The tool's ability to whitelist applications and automatically elevate privileges improved user efficiency by reducing the number of prompts they had to respond to. This not only enhanced security but also made day-to-day operations smoother for the end-users.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Infosys achieves a 5–7 percent effort reduction across projects
Infosys, a global leader in consulting, technology, and outsourcing solutions, was facing significant challenges in application development and maintenance due to its distributed teams, changing business priorities and the need to stay in alignment with customer needs. The company used a mix of open source, home-grown and third-party applications to support application development projects. However, challenges resulting from distributed teams using manual processes increased as the company grew. It became more and more important for Infosys to execute its projects efficiently, so they could improve quality, reduce defects and minimize delays.
Case Study
WUN Systems Case Study
WUN Systems, a provider of an end-to-end Workspace Management Platform, wanted to offer a highly reliable and scalable VoIP service that would easily integrate into their platform. They were looking for an enterprise-grade, solid platform that would enable their customers to communicate seamlessly, whether they were working from their HQ, regional office or a remote location. WUN Systems was looking for an innovative, reliable and experienced communications vendor.
Case Study
Engine Informática offers SAP software as a service with IBM
Engine Informática, a Brazil-based company specializing in the implementation of SAP ERP solutions, identified a gap in the market for small and medium-sized companies. The company realized that the fixed infrastructure investment needed to run SAP 24/7, such as data centers, hardware, and support, meant that the per-user cost could be perceived as too high for smaller companies. The challenge was to reduce or eliminate the capital expenditures and implementation costs as much as possible to help reduce the barriers to entry for these smaller companies.
Case Study
Wittmann EDV-Systeme launches IT monitoring services
Small and medium-sized businesses often lack the know-how and resources required for thorough IT system monitoring. Wittmann EDV-Systeme wanted to launch a solution to plug the gap – enabling it to improve its own competitiveness and that of its customers. IT landscapes are becoming ever more complex and outsourcing is gaining popularity, IT systems must nonetheless remain easy-to-use and extremely reliable at all times. Automated, round-the-clock system monitoring therefore represents an immensely valuable proposition for companies: downtime for business-critical applications can be avoided, and IT systems remain available at all times.
Case Study
Delivering modern data protection with cloud scale backup from Cobalt Iron and IBM
Organizations are struggling to modernize their legacy data protection environments in the face of growing demands around new infrastructure, new applications, and budget consolidation. Virtualization and modern application development processes have significantly outgrown legacy backup architectures. In response, infrastructure teams have created multiple backup solution types to handle the varying SLAs (performance, scale, cost) required by their business sponsors. However, the sheer number and variety of solutions in this uncontrolled expansion creates huge amounts of work, threatening to overwhelm the IT team in many organizations. Today, developers may add new applications and virtual server instances by the hundreds per day without accounting for the restrictions of the existing backup infrastructure. They leverage the cloud for immediate compute and storage resources, yet rarely communicate succinctly with corporate IT to ensure that the appropriate data protection services are in place.
Case Study
IBM social business software connects and empowers employees for competitive advantage
Superior Group, a company providing workforce productivity solutions, found that its employees worldwide felt disconnected from headquarters, regional offices and each other due to outdated internal communication and collaboration tools. The company's intranet had become a top-down affair with little staff involvement, and employees lacked effective tools for anywhere/anytime communications. Those working remotely had limited access to co-workers and company apps. The main method of collaboration was inefficient email, challenging IT staff to manage a growing store of attachments. These factors inhibited the company from achieving its productivity goals.