CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world's leading companies - including 45 percent of the Fortune 100. CyberArk's dedicated team based in Washington, D.C. works closely with many U.S. Federal agencies to help protect their highest value information assets, infrastructure and applications.

CyberArk is certified by, compliant with, listed on: DoD UC APL, DHS CDM, Common Criteria, NERC-CIP, HSPD-12, Army CoN, ITES, NIST 800-171, NIST 800-53, NIST 800-82

CyberArk's U.S. headquarters are located in Newton, Mass. To learn more about CyberArk, visit www.cyberark.com, read the company blog, https://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.


The CyberArk Privileged Access Security Solution includes the following products:

  • Enterprise Password Vault® fully protects privileged credentials based on privileged account security policy and controls for who can access which passwords, and when.
  • Privileged Session Manager® isolates, controls, and monitors privileged user access as well as activities for critical UNIX, Linux, and Windows-based systems, databases, and virtual machines.
  • Privileged Threat Analytics™ analyzes and alerts on previously undetectable malicious privileged user behavior enabling incident response teams to disrupt and quickly respond to an attack.
  • Application Identity Manager™ eliminates hard-coded credentials, including passwords and encryption keys from applications, service accounts and scripts with no impact on application performance.
  • On-Demand Privileges Manager™ allows for control and continuous monitoring of the commands super-users run based on their role and task.
  • Endpoint Privilege Manager enforces least privilege, controls applications, and prevents credential theft on Windows and Mac desktops and Windows servers to contain attacks and to stop lateral movement.


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020

Federal Contracts


ITES-SW Contract # W52P1J-15-D-0008 Term: March 2015 - March 2020

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Florida - Palm Beach County

Through April 30, 2019

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Texas DIR-TSO-4288

Texas DIR Contract: DIR-TSO-4288 Contract Period: Through February 21, 2021 (with 2 option years)


Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021


Archived Events


Latest News

Carahsoft was recognized during the 2017 Americas Partner Excellence Awards at the 11th annual CyberArk Impact Americas Summit, the world’s largest event for privileged account security advocates.
CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced the CyberArk Privileged Account Security ...
Cyber-Ark® Software, a leading global information security provider for protecting and managing privileged accounts and sessions, critical applications and sensitive information, today announced it ...


SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC


This webinar focuses on The White House’s recent “30-Day Cyber Security Sprint”, specifically on how to tighten policies and practices for privileged users and addressing insider threat.The webinar focuses on specific guidelines from the White House document that CyberArk’s Privileged Accoun...

Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Inst...

Isolate, control and monitor all privileged administrator sessions to protect your databases, virtual environments, network devices and servers from insider threats and external cyber attacks and provide proof to your auditors around privileged session activity.

Malicious hackers are wreaking havoc across the globe with advanced cyber attacks that are well planned, sophisticated, and directly targeted at the most valuable core assets of an enterprise. The outsiders are breaking through the perimeter and endpoint defenses and gaining internal access. Once ...


CyberArk (NASDAQ: CYBR) is the #1 provider in privileged account security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise-on premises, in the cloud, on endpoints, and throughout the DevOps pipeline. Privileged accounts, credentials, and secrets allow...

Time is ticking to meet the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Phase 2 Privilege Management requirements. The U.S. Department of Homeland Security is continuously looking for better ways to help federal agencies manage and secure their networks by providing...

Solutions Brief

In October of 2011, the President of the United States of America signed Executive Order 13587 directing United States Government executive branch departments and agencies to establish, implement, monitor, and report on the effectiveness of insider threat programs

Solutions Brief
CyberArk Solutions for Department of Defense CIO PrioritiesMitigate insider threats and meet CYBERCOM orders through seemless behavior analytics and privileged user/audit/monitoring capability Enforce mechanism for end to end multifactor authentication (CAC/PKI) for all privileged users and device...

How CyberArk helps provide security in the cloud for the Federal governments most critical assets:Securing privileged access for devices (including: system, networking, and legacy) in the cloud with multi-factor authentication, including DOD CAC/ PKI Maintain 100% on DoD Scorecard reporting for pr...

Today’s attacks are sophisticated and complex, using multiple vectors to get to sensitive data—privileged accounts are a critical vector attackers will target to move laterally or to establish command and control.CyberArk’s Privileged Account Security Solution integrated with the Splunk Enterp...