Listing Thumbnail

    Privileged Access Management

     Info
    Sold by: CyberArk 
    CyberArk PAM solutions provide end-to-end security for internal IT admins & 3rd party vendors enabling secure high-risk access used to migrate, scale and operate applications on-premises or in the cloud. CyberArk allows IT teams to implement role-specific least privilege, and workflows for both secure standing access and Just-in-Time/Zero Standing Privileges workflows.
    Listing Thumbnail

    Privileged Access Management

     Info
    Sold by: CyberArk 

    Overview

    CyberArk Privileged Access Management solutions provide end-to-end security for internal IT admins & 3rd party vendors enabling secure high-risk access used to migrate, scale and operate applications on-premises or in the cloud. CyberArk allows IT teams to implement role-specific least privilege, and workflows for both secure standing access and Just-in-Time access with Zero Standing Privileges.

    CyberArk PAM solutions holistically secure both standing and just-in-time privileged access across the IT estate. With industry-leading capabilities for credential management, session isolation and monitoring, and detection of privileged access misuse, organizations can leverage CyberArk PAM to rapidly achieve their risk reduction, audit and compliance objectives.

    Vendor PAM capabilities help organizations defend against attacks targeting external vendors, contractors and other third parties with high-risk access to critical IT and OT assets. The authentication and provisioning processes are enabled by the biometric capabilities of the users smartphone. Vendor PAM integrates with CyberArk PAM solutions to allow passwordless, Just-in-Time access to accounts managed by CyberArk, eliminating the cost and operational overhead of deploying VPNs, agents, and dedicated laptops to vendors.

    For custom pricing, EULA, or a private contract, please contact AWS-Marketplace@cyberark.com , for a private offer.

    Highlights

    • Protect against the leading cause of breaches - compromised identities and credentials.
    • Deliver digital experiences that balance security and a frictionless experience.
    • A unified solution to address identity-oriented audit and compliance requirements.

    Details

    Sold by

    Delivery method

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Privileged Access Management

     Info
    Pricing is based on contract duration. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    AWS_25_PRIV_STDANDARD_USER_SAAS
    Standard Privilege Cloud users - 25 users
    $44,712.00

    Vendor refund policy

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Support

    Vendor support

    Contact CyberArk for support related questions: www.cyberark.com/customer-support 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By JumpCloud, Inc.
    By Trend Micro

    Accolades

     Info
    Top
    50
    In Monitoring, Application Development
    Top
    10
    In Application Servers
    Top
    50
    In Security

    Customer reviews

     Info
    AI generated sentiment from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Credential Management
    Provides industry-leading capabilities for credential management to secure both standing and just-in-time privileged access across the IT estate.
    Session Isolation and Monitoring
    Offers session isolation and monitoring capabilities to detect privileged access misuse.
    Just-in-Time Access
    Enables Just-in-Time access with Zero Standing Privileges workflows to rapidly achieve risk reduction, audit and compliance objectives.
    Vendor PAM Capabilities
    Helps defend against attacks targeting external vendors, contractors and other third parties with high-risk access to critical IT and OT assets through biometric-enabled authentication and provisioning processes.
    Least Privilege Implementation
    Allows IT teams to implement role-specific least privilege to secure high-risk access used to migrate, scale and operate applications on-premises or in the cloud.
    Cloud Directory Platform
    Centralize access across all identities with integrations to AWS Identity Center, Google Workspace, Microsoft 365, Active Directory, HRIS platforms, and network infrastructure resources
    Single Sign-On (SSO) & Multi-Factor Authentication (MFA)
    Provide frictionless, secure access to AWS resources and over 900 pre-built applications with automated user provisioning to Amazon IAM Identity Center and group-based permissions
    Cross-OS Server & Device Management
    Deploy, manage, and remotely assist Windows, macOS and iOS, Linux and AWS Linux AMIs, and Android servers and corporate devices from a single cloud platform
    Passwordless Access
    Enable phishing-resistant, one-click user access via JumpCloud Go
    Conditional Access
    Ensure that only specific users working on trusted devices and networks can access AWS resources with complete IAM, device management, and enhanced access controls
    Attack Surface Risk Management
    Proactively manage and assess risk with accuracy. Eliminate blind spots, and reduce exposure with continuous attack surface discovery, asset risk assessment, and automated risk mitigation for known, unknown, internal, and internet-facing assets.
    Extended Detection and Response (XDR)
    Simplify security operations. Integrate the industry leading XDR solution with endpoint protection, detection, and response. Trend Vision One delivers native sensor coverage for endpoint, identity, email, network, and cloud workload with extensive third-party integration support.
    Automated Risk Mitigation and Threat Response
    Slow attackers down. Orchestrate and automate risk mitigation, threat response, and zero trust access control from a single console to defend and overcome stealthy attacks.
    Global Threat Intelligence
    Global and local threat intelligence captures both individual threat components and APT data to detail how individual malware detections and vulnerabilities contribute to a breach before, during, and after an attack occurs.
    Integrated Security Operations
    Centrally manage proactive cyber risk management and threat detection and response. Integrate with your broader ecosystem. Converge, simplify, and harmonize security operations.

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    No security profile
    No security profile
    -
    -

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    1 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Nicholas B.

    Cyberark EPM solid product

    Reviewed on Aug 01, 2023
    Review provided by G2
    What do you like best about the product?
    Easy to deploy and a great tool to give the limited access to admin privileges that users need sometimes. Keeps a company compliant with also keeping the business functioning. Reliable software that is easy to maintain as an admin.
    What do you dislike about the product?
    While the UI has been slightly updated over the past few years it still could be modernized. Also, the product has an ok learning curve and could use a better knowledge base when compared to other software.
    What problems is the product solving and how is that benefiting you?
    We have certain tasks and processes that require admin access to be done. We as IT can't spend every day giving admin access when people are just trying to do their job. The product lets us give users limited admin access to do what they need but keeps us as a company safe and compliant.
    View all reviews