Вы находитесь на странице: 1из 2

Application

Identity Manager

The Challenge
Fully address the In todays complex IT environments, multiple scripts, processes and applications need to access multi-platform
resources to retrieve and store sensitive information. Such applications are granted use of dedicated accounts,
security challenges usually allowing unlimited access to sensitive information stored in corporate databases. These accounts are
of eliminating hard- usually embedded inside the application code, scripts, services, data sources, configuration files and more.
These accounts often give access to an enterprises most sensitive assets and as a result are often the victim of
coded application ongoing targeted attacks. Indeed, many of the recent sophisticated attacks reported stemmed from the
and script credentials compromise of hard-coded privileged credentials.

across your data Securing, managing and automatically replacing these hard-coded credentials impose significant challenges
and a major overhead to IT departments. As a result, up to 42% of enterprises report that they never change
center and application
hard-coded and embedded passwords for application IDs, testing scripts and batch jobs.
infrastructure.
Mismanaged App2App passwords impose great risks to organizations including:

Failed Audits. Hard-coded and embedded Solution & Key Benefits


passwords pose serious auditing challenges to
organizations. The PCI Data Security Standard, CyberArks market-leading Application Identity
for instance, specifically instructs enterprises to Manager (AIM) fully addresses the security challenges
develop and maintain secure systems and of eliminating hard-coded application credentials
applications, remove any custom usernames with a proven enterprise-ready solution for smooth
and passwords from applications, including the deployment across your data center. With AIM you can:
enforcement of strong access control and
Approach Compliance with Confidence.
With Application Identity Manager you authentication mechanisms on systems
Organizations can comply with internal and regulatory
can eliminate hard-coded and visible accessing cardholders data.
credentials from scripts, jobs and requirements for regularly replacing passwords and
applications. Moreover, push updated Lack of Accountability. Application passwords securely monitoring privileged access.
credentials to configuration files,
databases and 3rd party applications may be required for use by IT personnel or
Eliminate Internal and External Threats.
where code changes are not feasible. developers for troubleshooting and emergency
Ensure your critical business systems with your
cases. Existing solutions provide very limited
most sensitive data are tightly protected by
auditing and control for such scenarios.
eliminating the need to store App2App
Security Risks. App2App passwords are almost passwords and encryption keys found in
never changed and often stored in clear text applications, scripts or configuration files.
and known by a wide variety of IT personnel,
developers and regular end-users as well as Do Business Better. Secure your core business
many ex-employees or external sub-contractors. systems while they continue running with unparalleled
Any attempt to change hard-coded passwords availability and performance in App2App processes,
would usually require code changes which independent of network availability.
could negatively impact production systems, Application Identity Manager offers you unique value:
resulting in continuous downtime to critical
- Minimize financial losses and reputational
business applications.
damage by eliminating hard-coded and visible
Elevated DamageThreat. Application accounts credentials from applications and scripts.
are powerful accounts with almost unlimited
- Future-ready solution that easily evolves with you
access to backend systems. Compromising the
to secure a multitude of applications over multiple
application account may lead to uncontrolled
platforms and sites as your business grows.
access to highly-sensitive business information
- Increase business continuity across your data
and to severe damages.
center during application credentials
management.
.
Specifications
Features Unique Solution for Application Server Encryption Algorithms:
Data-Source Credentials.
Application Identity Manager (AIM) utilizes AIM provides the only solution for securing and AES-256, RSA-2048
CyberArks patented Digital Vault Technology, automatically managing credentials required by HSM integration
which is ICSA certified, and designed to meet mission critical applications and stored within FIPS 140-2 validated cryptography
the highest security requirements for managing Application Server Data Sources. The patent
privileged and App2App accounts. The Digital Vault pending solution is implemented without code
Access and Workflow
provides numerous underlying security capabilities Management:
changes and zero downtime or restarts are
for authentication, encryption, tamper-proof audit required during password changes. LDAP directories
and data protection. Identity and Access Management
Out Of The Box Solution for Third Party
Ticketing and workflow systems
AIM delivers a complete infrastructure to centralize Applications.
the management of credentials to resources along Many third party applications, such as Authentication Methods:
with a comprehensive set of abilities for managing vulnerability scanning solutions, CRM products
Username and Password
these service accounts, including: and more, require privileged credentials in
RSA SecurID
order to access sensitive devices or databases
Web SSO
Eliminate Hard-Coded Passwords. to perform their job. They use credentials found
RADIUS
Using the AIM variety of password SDKs, in config files, databases etc to access these
PKI and smartcards
enterprises can remove passwords from all systems. AIM integrates with these third party
LDAP
scripts, application code and configuration files, products to securely deliver the credential
Windows-based Authentication
making them invisible to developers and when necessary while automatically managing
support staff while automatically replacing and replacing these credentials for better High Availability:
credentials based on policy without any impact protection of your IT resources. Clustering support
to application performance or downtime. Web Based UI for Managing Applications. Persistent secure local cache

Flexible views allow enterprises to audit, track and Multiple Disaster Recovery sites
Automatic Password Synchronization.
To comply with audit regulations, AIM offers securely manage all their App2App communication. Integration with enterprise backup system

the ability to change passwords on demand Encryption.


Monitoring:
and according to the enterprise policy without All passwords are encrypted while at rest in the
SIEM integration
any interruption to production or need for Vault or in a secure local cache and while in
SNMP traps
development/testing and IT support. AIM can transit to the requesting application.
also be utilized to push passwords to different Email notifications
Enterprise Readiness.
locations within configuration files, databases Application Platforms:
Easily integrates with the enterprise infrastructure.
and 3rd party applications, where code
This includes LDAP and IAM integration for user Windows
changes are not feasible
management and automatic account Linux/UNIX
Application Authentication. provisioning; use of Windows domain, RADIUS, AIX
AIM utilizes advanced means to authenticate PKI, SSO or RSA SecurID for authentication; Solaris
applications requesting credentials ensuring monitoring and SIEM integration using SNMP, HP-UX
only allowed applications can access them. This Syslog and SMTP; integration with ticketing and
includes enforcing limitations like machine workflow systems; robust SDK, built-in HA/DR Application Platforms:
address, OS user, application path and run-time and much more! Java
signature. CLI
High Availability, Redundancy and Business A Comprehensive Solution COM
Continuity. C/C++
AIM is designed to meet high-end enterprise CyberArk Application Identity Manager is a component Application Servers: Websphere,
requirements for availability and business continuity of the CyberArk Privileged Account Security Solution, a WebLogic, JBOSS, Tomcat
for the most critical business applications, even complete solution to protect, monitor, detect, alert, and
within complex and distributed network respond to privileged accounts. Products in the solution
environments. With its secure caching capabilities, can be managed independently, or combined for a
enterprises can rest assure their mission critical cohesive and complete solution for operating systems,
applications will always have access to their service databases, applications, hypervisors, network devices,
accounts, independent of network performance security appliances and more. The solution is based on
and availability. The caching agents require zero the CyberArk Shared Technology Platform which delivers
management while providing the highest levels of enterprise-class security and allows customers to deploy
resiliency and performance to calling applications. a single infrastructure and expand the solution to meet
changing business requirements.

Cyber-Ark Software Ltd. | cyberark.com

Вам также может понравиться