• slide
  • slide
  • slide
  • slide

Overview

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world's leading companies - including 45 percent of the Fortune 100. CyberArk's dedicated team based in Washington, D.C. works closely with many U.S. Federal agencies to help protect their highest value information assets, infrastructure and applications.

CyberArk is certified by, compliant with, listed on: DoD UC APL, DHS CDM, Common Criteria, NERC-CIP, HSPD-12, Army CoN, ITES, NIST 800-171, NIST 800-53, NIST 800-82

CyberArk's U.S. headquarters are located in Newton, Mass. To learn more about CyberArk, visit www.cyberark.com, read the company blog, https://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.

Products

The CyberArk Privileged Access Security Solution includes the following products:

  • Enterprise Password Vault®

    Enterprise Password Vault® fully protects privileged credentials based on privileged account security policy and controls for who can access which passwords, and when.

  • Privileged Session Manager®

    Privileged Session Manager® isolates, controls, and monitors privileged user access as well as activities for critical UNIX, Linux, and Windows-based systems, databases, and virtual machines.

  • Privileged Threat Analytics™

    Privileged Threat Analytics™ analyzes and alerts on previously undetectable malicious privileged user behavior enabling incident response teams to disrupt and quickly respond to an attack.

  • Application Identity Manager™

    Application Identity Manager™ eliminates hard-coded credentials, including passwords and encryption keys from applications, service accounts and scripts with no impact on application performance.

  • On-Demand Privileges Manager™

    On-Demand Privileges Manager™ allows for control and continuous monitoring of the commands super-users run based on their role and task.

  • Endpoint Privilege Manager

    Endpoint Privilege Manager enforces least privilege, controls applications, and prevents credential theft on Windows and Mac desktops and Windows servers to contain attacks and to stop lateral movement.

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2021

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2025

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

4400004253
May 01, 2009- Dec 19, 2021

Fairfax County IT Hardware, Software, & Services

4400006323
Oct 04, 2015- Dec 04, 2021
*Additional Option Years Available

Maryland Master Contract (COTS)

060B2490021
Oct 01, 2012- Sep 30, 2027

Pennsylvania COSTARS-6 IT Software Contract

COSTARS-006-176
Aug 31, 2017- Aug 31, 2021

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Texas DIR-TSO-4288

DIR-TSO-4288
Feb 22, 2019- Feb 21, 2021
*Additional Option Years Available

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2021

Events

Upcoming Events

November 17, 2020 at 2:00 PM ET

Archived Events

News

Latest News

Carahsoft was recognized during the 2017 Americas Partner Excellence Awards at the 11th annual CyberArk Impact Americas Summit, the world’s largest event for privileged account security advocates.
READ MORE >
CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced the CyberArk Privileged Account Security ...
READ MORE >
Cyber-Ark® Software, a leading global information security provider for protecting and managing privileged accounts and sessions, critical applications and sensitive information, today announced it ...
READ MORE >

Resources

Resource

This webinar focuses on The White House’s recent “30-Day Cyber Security Sprint”, specifically on how to tighten policies and practices for privileged users and addressing insider threat.The webinar focuses on specific guidelines from the White House document that CyberArk’s Privileged Accoun...

Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Inst...

Isolate, control and monitor all privileged administrator sessions to protect your databases, virtual environments, network devices and servers from insider threats and external cyber attacks and provide proof to your auditors around privileged session activity.

Malicious hackers are wreaking havoc across the globe with advanced cyber attacks that are well planned, sophisticated, and directly targeted at the most valuable core assets of an enterprise. The outsiders are breaking through the perimeter and endpoint defenses and gaining internal access. Once ...

Resources

CyberArk (NASDAQ: CYBR) is the #1 provider in privileged account security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise-on premises, in the cloud, on endpoints, and throughout the DevOps pipeline. Privileged accounts, credentials, and secrets allow...

Time is ticking to meet the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Phase 2 Privilege Management requirements. The U.S. Department of Homeland Security is continuously looking for better ways to help federal agencies manage and secure their networks by providing...

Solutions Brief

In October of 2011, the President of the United States of America signed Executive Order 13587 directing United States Government executive branch departments and agencies to establish, implement, monitor, and report on the effectiveness of insider threat programs

Gartner estimates 80% of all data in the world is stored in files, and oftentimes, these files are stored in insecure locations. Furthermore, many state and local governments and agencies have no visibility into where these files reside, what each file contains and who can access this data.

CyberArk200x250.fw.png
Solutions Brief
CyberArk Solutions for Department of Defense CIO PrioritiesMitigate insider threats and meet CYBERCOM orders through seemless behavior analytics and privileged user/audit/monitoring capability Enforce mechanism for end to end multifactor authentication (CAC/PKI) for all privileged users and device...

How CyberArk helps provide security in the cloud for the Federal governments most critical assets:Securing privileged access for devices (including: system, networking, and legacy) in the cloud with multi-factor authentication, including DOD CAC/ PKI Maintain 100% on DoD Scorecard reporting for pr...