• slide
  • slide
  • slide
  • slide


CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world's leading companies - including 45 percent of the Fortune 100. CyberArk's dedicated team based in Washington, D.C. works closely with many U.S. Federal agencies to help protect their highest value information assets, infrastructure and applications.

CyberArk is certified by, compliant with, listed on: DoD UC APL, DHS CDM, Common Criteria, NERC-CIP, HSPD-12, Army CoN, ITES, NIST 800-171, NIST 800-53, NIST 800-82

CyberArk's U.S. headquarters are located in Newton, Mass. To learn more about CyberArk, visit www.cyberark.com, read the company blog, https://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.


The CyberArk Privileged Access Security Solution includes the following products:

  • Enterprise Password Vault®

    Enterprise Password Vault® fully protects privileged credentials based on privileged account security policy and controls for who can access which passwords, and when.

  • Privileged Session Manager®

    Privileged Session Manager® isolates, controls, and monitors privileged user access as well as activities for critical UNIX, Linux, and Windows-based systems, databases, and virtual machines.

  • Privileged Threat Analytics™

    Privileged Threat Analytics™ analyzes and alerts on previously undetectable malicious privileged user behavior enabling incident response teams to disrupt and quickly respond to an attack.

  • Application Identity Manager™

    Application Identity Manager™ eliminates hard-coded credentials, including passwords and encryption keys from applications, service accounts and scripts with no impact on application performance.

  • On-Demand Privileges Manager™

    On-Demand Privileges Manager™ allows for control and continuous monitoring of the commands super-users run based on their role and task.

  • Endpoint Privilege Manager

    Endpoint Privilege Manager enforces least privilege, controls applications, and prevents credential theft on Windows and Mac desktops and Windows servers to contain attacks and to stop lateral movement.




Mar 31, 2021- Mar 30, 2026

GSA Multiple Award Schedule (MAS)

Dec 20, 2011- Dec 19, 2021


May 01, 2015- Apr 30, 2025

State and Local


Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

May 01, 2009- Dec 19, 2021

Educational Software Solutions and Services - OMNIA Partners, Public Sector

Feb 27, 2020- Apr 30, 2023
*Additional Option Years Available

Fairfax County IT Hardware, Software, & Services

Oct 04, 2015- Dec 04, 2021
*Additional Option Years Available

Maryland Master Contract (COTS)

Oct 01, 2012- Sep 30, 2027

OH STS 0119Y

May 31, 2012- Dec 19, 2021

Pennsylvania COSTARS-6 IT Software Contract

Aug 31, 2017- Aug 31, 2021

State of Indiana Contract

Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

Aug 01, 2017- Aug 01, 2021

Texas DIR-TSO-4288

Feb 22, 2019- Feb 21, 2023
*Additional Option Years Available


Illinois Learning Technology Purchase Program (ILTPP)

May 20, 2019- Mar 01, 2022

Massachusetts Higher Education Consortium (MHEC)

Aug 10, 2019- Jun 30, 2022


Oct 20, 2015- Sep 03, 2025


May 02, 2014- Dec 19, 2021


Upcoming Events

August 26, 2021 at 1:00 PM ET

Archived Events


Latest News

Carahsoft was recognized during the 2017 Americas Partner Excellence Awards at the 11th annual CyberArk Impact Americas Summit, the world’s largest event for privileged account security advocates.
CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced the CyberArk Privileged Account Security ...
Cyber-Ark® Software, a leading global information security provider for protecting and managing privileged accounts and sessions, critical applications and sensitive information, today announced it ...



This webinar focuses on The White House’s recent “30-Day Cyber Security Sprint”, specifically on how to tighten policies and practices for privileged users and addressing insider threat.The webinar focuses on specific guidelines from the White House document that CyberArk’s Privileged Account Securi...

Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Inst...

Isolate, control and monitor all privileged administrator sessions to protect your databases, virtual environments, network devices and servers from insider threats and external cyber attacks and provide proof to your auditors around privileged session activity.


Agencies must secure themselves against malicious cyber attacks that can take cover behind insider privileges and go after critical assets. CyberArk leads the market by delivering a new category of targeted security solutions that help leaders prevent attack escalation before irreparable business...

CyberArk Resources
CyberArk (NASDAQ: CYBR) is the #1 provider in privileged account security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise-on premises, in the cloud, on endpoints, and throughout the DevOps pipeline. Privileged accounts, credentials, and secrets allow...

CyberArk Resources
Secure identities. Stop attacks.

Time is ticking to meet the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Phase 2 Privilege Management requirements. The U.S. Department of Homeland Security is continuously looking for better ways to help federal agencies manage and secure their networks by providing...

Malicious hackers are wreaking havoc across the globe with advanced cyber attacks that are well planned, sophisticated, and directly targeted at the most valuable core assets of an enterprise. The outsiders are breaking through the perimeter and endpoint defenses and gaining internal access. Once in...

Solutions Brief

In October of 2011, the President of the United States of America signed Executive Order 13587 directing United States Government executive branch departments and agencies to establish, implement, monitor, and report on the effectiveness of insider threat programs

Gartner estimates 80% of all data in the world is stored in files, and oftentimes, these files are stored in insecure locations. Furthermore, many state and local governments and agencies have no visibility into where these files reside, what each file contains and who can access this data.