Listing Thumbnail

    Privileged Access Management

     Info
    Sold by: CyberArk 
    CyberArk PAM solutions provide end-to-end security for internal IT admins & 3rd party vendors enabling secure high-risk access used to migrate, scale and operate applications on-premises or in the cloud. CyberArk allows IT teams to implement role-specific least privilege, and workflows for both secure standing access and Just-in-Time/Zero Standing Privileges workflows.
    Listing Thumbnail

    Privileged Access Management

     Info
    Sold by: CyberArk 

    Overview

    CyberArk Privileged Access Management solutions provide end-to-end security for internal IT admins & 3rd party vendors enabling secure high-risk access used to migrate, scale and operate applications on-premises or in the cloud. CyberArk allows IT teams to implement role-specific least privilege, and workflows for both secure standing access and Just-in-Time access with Zero Standing Privileges.

    CyberArk PAM solutions holistically secure both standing and just-in-time privileged access across the IT estate. With industry-leading capabilities for credential management, session isolation and monitoring, and detection of privileged access misuse, organizations can leverage CyberArk PAM to rapidly achieve their risk reduction, audit and compliance objectives.

    Vendor PAM capabilities help organizations defend against attacks targeting external vendors, contractors and other third parties with high-risk access to critical IT and OT assets. The authentication and provisioning processes are enabled by the biometric capabilities of the users smartphone. Vendor PAM integrates with CyberArk PAM solutions to allow passwordless, Just-in-Time access to accounts managed by CyberArk, eliminating the cost and operational overhead of deploying VPNs, agents, and dedicated laptops to vendors.

    For custom pricing, EULA, or a private contract, please contact AWS-Marketplace@cyberark.com , for a private offer.

    Highlights

    • Protect against the leading cause of breaches - compromised identities and credentials.
    • Deliver digital experiences that balance security and a frictionless experience.
    • A unified solution to address identity-oriented audit and compliance requirements.

    Details

    Sold by

    Delivery method

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Privileged Access Management

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    AWS_25_PRIV_STDANDARD_USER_SAAS
    Standard Privilege Cloud users - 25 users
    $44,712.00

    Vendor refund policy

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Support

    Vendor support

    Contact CyberArk for support related questions: www.cyberark.com/customer-support 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Trend Micro
    By BeyondTrust Corporation

    Accolades

     Info
    Top
    50
    In Monitoring, Application Development
    Top
    50
    In Security
    Top
    100
    In Financial Services, Monitoring

    Customer reviews

     Info
    AI generated sentiment from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Privileged Access Control
    Implements role-specific least privilege access management across on-premises and cloud environments
    Authentication Workflow
    Supports secure standing access and Just-in-Time/Zero Standing Privileges authentication mechanisms
    Credential Management
    Provides industry-leading capabilities for managing, isolating, and monitoring privileged access credentials
    Vendor Access Security
    Enables passwordless, biometric-based authentication for external vendors and third-party contractors
    Threat Detection
    Offers detection capabilities for identifying and mitigating potential misuse of privileged access
    Threat Intelligence
    Advanced global and local threat intelligence capturing individual threat components and APT data to analyze malware detections and vulnerabilities across attack stages
    Attack Surface Management
    Continuous attack surface discovery, asset risk assessment, and automated risk mitigation for known, unknown, internal, and internet-facing assets
    Extended Detection and Response
    Native sensor coverage for endpoint, identity, email, network, and cloud workload with comprehensive cross-layer protection and next-generation XDR technology
    Security Automation
    Orchestration and automation of risk mitigation, threat response, and zero trust access control from a centralized management console
    Multi-Environment Protection
    Integrated cybersecurity platform supporting diverse hybrid IT environments with comprehensive protection across email, endpoint, network, cloud, OT, and secure access domains
    Identity Threat Detection
    Advanced discovery and intelligence system for detecting identity-based threats across infrastructure
    Privileged Access Management
    Comprehensive control and management of privileged passwords, accounts, credentials, and sessions for human and machine identities
    Remote Access Security
    Granular control, management, and auditing of privileged remote access for employees, vendors, developers, and cloud operations engineers
    Endpoint Privilege Control
    Dynamic least privilege enforcement across Windows, macOS, Linux, and mobile platforms to prevent malware and unauthorized access
    Cloud Entitlement Management
    Cross-cloud visibility of access permissions, detection of account permission anomalies, and guidance for privilege optimization

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    No security profile
    -
    -
    No security profile

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    1 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Nicholas B.

    Cyberark EPM solid product

    Reviewed on Aug 01, 2023
    Review provided by G2
    What do you like best about the product?
    Easy to deploy and a great tool to give the limited access to admin privileges that users need sometimes. Keeps a company compliant with also keeping the business functioning. Reliable software that is easy to maintain as an admin.
    What do you dislike about the product?
    While the UI has been slightly updated over the past few years it still could be modernized. Also, the product has an ok learning curve and could use a better knowledge base when compared to other software.
    What problems is the product solving and how is that benefiting you?
    We have certain tasks and processes that require admin access to be done. We as IT can't spend every day giving admin access when people are just trying to do their job. The product lets us give users limited admin access to do what they need but keeps us as a company safe and compliant.
    View all reviews