Cyber-Ark Detail

[mk_page_section bg_image=”” attachment=”fixed” bg_position=”center center” bg_repeat=”no-repeat” bg_stretch=”true” enable_3d=”true” video_color_mask=”#000000″ min_height=”0″ full_width=”true” padding_top=”140″ padding_bottom=”180″ first_page=”false” last_page=”false” sidebar=”sidebar-1″][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_column_text disable_pattern=”false”]

Product & Services

[/vc_column_text][mk_fancy_title color=”#30a0e7″ size=”65″ txt_transform=”none” margin_top=”10″ margin_bottom=”10″ font_family=”Montserrat” font_type=”google”]True Happiness[/mk_fancy_title][vc_column_text disable_pattern=”false”]

“We want you to know that we care about our valued customers,
so that we are here to serve you with our reliable services as well
as our wide selection of products. We are currently holding the partnership
of Intel Security, Cyber-Ark, SailPoint, Tufin, Infoblox, Aruba,Tripwire, Fortinet, and
Forcepoint. We also provide all services that are related to these
product implementations, from implementation,
maintenance, and support services.”

Aplikas Servis Pesona offers world-class products among others:

[/vc_column_text][/vc_column][/mk_page_section][vc_row][vc_column][mk_padding_divider size=”60″][mk_image src=”” image_size=”full” align=”center”][mk_padding_divider size=”20″][mk_fancy_title color=”#21a7e0″ size=”24″ margin_top=”20″ font_family=”none” align=”center”]CyberArk Products[/mk_fancy_title][/vc_column][/vc_row][vc_row fullwidth=”true” css=”.vc_custom_1486348860684{margin-top: 50px !important;background-color: #f2f2f2 !important;}”][vc_column width=”1/2″ css=”.vc_custom_1486348890401{padding-left: 50px !important;}”][mk_padding_divider][mk_fancy_title size=”16″ font_family=”none”]SSH Key Manager[/mk_fancy_title][vc_column_text]CyberArk SSH Key Manager is designed to securely store, rotate and control access to SSH keys to prevent unauthorized access to privileged accounts. Built on the CyberArk Shared Technology Platform, SSH Key Manager leverages the Digital Vault infrastructure to ensure that SSH keys are protected with the highest levels of security, including the encryption of keys at rest and in transit, granular access controls and integrations with strong authentication solutions. Detailed audit logs and reporting capabilities provide visibility into key usage to meet audit and compliance requirements.

SSH Key Manager integrates with the CyberArk Privileged Account Security Solution, enabling organizations to protect all privileged credentials, including SSH keys and passwords, from a single integrated platform that can be built out over time in accordance with business needs.[/vc_column_text][mk_padding_divider][/vc_column][vc_column width=”1/2″][mk_padding_divider][mk_fancy_title size=”16″ font_family=”none”]Privileged Session Manager[/mk_fancy_title][vc_column_text]CyberArk Privileged Session Manager, part of the CyberArk Privileged Account Security Solution, enables organizations to isolate, monitor, record and control privileged sessions on critical systems including Unix and Windows-based systems, databases and virtual machines.  The solution acts as a jump server and single access control point, prevents malware from jumping to a target system, and records keystrokes and commands for continuous monitoring.  The resulting detailed session recordings and audit logs are used to simplify compliance audits and accelerate forensics investigations.[/vc_column_text][mk_padding_divider][/vc_column][/vc_row][vc_row fullwidth=”true”][vc_column width=”1/2″ css=”.vc_custom_1486350946976{padding-left: 50px !important;}”][mk_padding_divider size=”60″][mk_image src=”” image_height=”600″ align=”center”][mk_padding_divider][/vc_column][vc_column width=”1/2″][mk_padding_divider size=”170″][mk_fancy_title size=”16″ font_family=”none”]End Point Privilege Manager[/mk_fancy_title][vc_column_text]Enforcing privilege security on the endpoint is a fundamental part of your security program. However, this can impact user and helpdesk productivity. CyberArk Endpoint Privilege Manager helps remove this barrier and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.[/vc_column_text][mk_padding_divider][/vc_column][/vc_row][vc_row fullwidth=”true” css=”.vc_custom_1486348860684{margin-top: 50px !important;background-color: #f2f2f2 !important;}”][vc_column width=”1/2″ css=”.vc_custom_1486348890401{padding-left: 50px !important;}”][mk_padding_divider][mk_fancy_title size=”16″ font_family=”none”]Application Identity Manager[/mk_fancy_title][vc_column_text]CyberArk Application Identity Manager, part of the CyberArk Privileged Account Security Solution, enables organizations to protect critical business systems by eliminating hard-coded credentials from application scripts, configuration files and software code, and removing SSH keys from servers where they are used by applications and scripts. Application Identity Manager offers agent and agentless deployment options to best meet the security and availability requirements of various business applications. The product is built on the CyberArk Shared Technology Platform, delivering scalability, high availability and centralized management and reporting.[/vc_column_text][mk_padding_divider][/vc_column][vc_column width=”1/2″][mk_padding_divider][mk_fancy_title size=”16″ font_family=”none”]Privileged Threat Analytics[/mk_fancy_title][vc_column_text]CyberArk Privileged Threat Analytics, part of the CyberArk Privileged Account Security Solution, is a security intelligence system that allows organizations to detect, alert, and respond to cyber attacks targeting privileged accounts. The solution is designed to identify an attack in real-time and automatically respond to stop an attacker from continuing to advance the attack. At the core of the solution, the analytics engine runs a sophisticated combination of proprietary algorithms – including both deterministic and behavior-based – on users, entities, and network traffic to detect indications of compromise early in the attack lifecycle. By identifying attackers early, security teams have more of the critical time they need to be able to stop an attack before it stops business.[/vc_column_text][mk_padding_divider][/vc_column][/vc_row][vc_row fullwidth=”true” css=”.vc_custom_1486355018767{background-color: #ffffff !important;}”][vc_column width=”1/2″ css=”.vc_custom_1486355037929{padding-left: 50px !important;}”][mk_padding_divider][mk_fancy_title size=”16″ font_family=”none”]Enterprise Password Vault[/mk_fancy_title][vc_column_text]CyberArk Enterprise Password Vault is designed to secure, rotate and control access to privileged
account passwords based on organizational policies. The solution is proven to scale in the largest, most complex enterprise IT environments, and it can protect privileged account passwords used to access the vast majority of systems.[/vc_column_text][mk_padding_divider][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1486355108361{background-color: #ffffff !important;}”][mk_padding_divider][mk_blockquote font_family=”none”]CyberArk Enterprise Password Vault offered a best practice approach to compliance, enabling us to better enforce policies and automate password replacement.

Jethro Cornelissen

Global Lead & Head of Global Security Operations Center Rabobank International

[/mk_blockquote][/vc_column][/vc_row][vc_row fullwidth=”true” disable_element=”yes” css=”.vc_custom_1490604906640{padding-left: 50px !important;background-color: #f2f2f2 !important;}”][vc_column][mk_padding_divider][vc_column_text align=”center”][wpdm_package id=’6404′][/vc_column_text][mk_padding_divider][/vc_column][/vc_row]