• slide
  • slide
  • slide
  • slide


CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world's leading companies - including 45 percent of the Fortune 100. CyberArk's dedicated team based in Washington, D.C. works closely with many U.S. Federal agencies to help protect their highest value information assets, infrastructure and applications.

CyberArk is certified by, compliant with, listed on: DoD UC APL, DHS CDM, Common Criteria, NERC-CIP, HSPD-12, Army CoN, ITES, NIST 800-171, NIST 800-53, NIST 800-82

CyberArk's U.S. headquarters are located in Newton, Mass. To learn more about CyberArk, visit www.cyberark.com, read the company blog, https://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.


The CyberArk Privileged Access Security Solution includes the following products:

  • Enterprise Password Vault®

    Enterprise Password Vault® fully protects privileged credentials based on privileged account security policy and controls for who can access which passwords, and when.

  • Privileged Session Manager®

    Privileged Session Manager® isolates, controls, and monitors privileged user access as well as activities for critical UNIX, Linux, and Windows-based systems, databases, and virtual machines.

  • Privileged Threat Analytics™

    Privileged Threat Analytics™ analyzes and alerts on previously undetectable malicious privileged user behavior enabling incident response teams to disrupt and quickly respond to an attack.

  • Application Identity Manager™

    Application Identity Manager™ eliminates hard-coded credentials, including passwords and encryption keys from applications, service accounts and scripts with no impact on application performance.

  • On-Demand Privileges Manager™

    On-Demand Privileges Manager™ allows for control and continuous monitoring of the commands super-users run based on their role and task.

  • Endpoint Privilege Manager

    Endpoint Privilege Manager enforces least privilege, controls applications, and prevents credential theft on Windows and Mac desktops and Windows servers to contain attacks and to stop lateral movement.



GSA Schedule 70

Dec 20, 2011- Dec 19, 2021


May 01, 2015- Apr 30, 2025

State and Local


Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

May 01, 2009- Dec 19, 2021

Fairfax County IT Hardware, Software, & Services

Oct 04, 2015- Dec 04, 2021
*Additional Option Years Available

Maryland Master Contract (COTS)

Oct 01, 2012- Sep 30, 2027

Pennsylvania COSTARS-6 IT Software Contract

Aug 31, 2017- Aug 31, 2021

State of Indiana Contract

Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

Aug 01, 2017- Aug 01, 2021

Texas DIR-TSO-4288

Feb 22, 2019- Feb 21, 2021
*Additional Option Years Available


Massachusetts Higher Education Consortium (MHEC)

Aug 10, 2019- Jun 30, 2022


May 02, 2014- Dec 19, 2021


Upcoming Events

November 17, 2020 at 2:00 PM ET

Archived Events


Latest News

Carahsoft was recognized during the 2017 Americas Partner Excellence Awards at the 11th annual CyberArk Impact Americas Summit, the world’s largest event for privileged account security advocates.
CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced the CyberArk Privileged Account Security ...
Cyber-Ark® Software, a leading global information security provider for protecting and managing privileged accounts and sessions, critical applications and sensitive information, today announced it ...


Solutions Brief

How CyberArk helps provide security in the cloud for the Federal governments most critical assets:Securing privileged access for devices (including: system, networking, and legacy) in the cloud with multi-factor authentication, including DOD CAC/ PKI Maintain 100% on DoD Scorecard reporting for pr...

Today’s attacks are sophisticated and complex, using multiple vectors to get to sensitive data—privileged accounts are a critical vector attackers will target to move laterally or to establish command and control.CyberArk’s Privileged Account Security Solution integrated with the Splunk Enterp...

Federal government agencies and their contractors are frequent targets in today’s advanced attacks. Whether the goal is to compromise sensitive government data, steal personally identifiable information (PII) or disrupt normal operations, the increasing sophistication of attacks is making it m...


The most complete solution to reduce risk and operational inefficiencies introduced by unsecured access

This CyberArk white paper will: ? Outline several increasingly prevalent Kerberos attack methods, which can enable control over a target’s network by commandeering the domain controllerPresent strategies to help reduce and block an attacker’s progress at two critical phases of the attack lifec...