Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE

CyberArk Expands C3 Alliance to Drive Greater Cyber Security Innovation and Collaboration

March 22, 2017

New Integrations with Atos, Phantom, Proofpoint and RSA Enable Customers to Drive More Effective Security and Value from Existing IT Investments

NEWTON, Mass. and PETACH TIKVA, Israel – March 22, 2017 – CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced the expansion of the C3 Alliance, CyberArk’s global technology partner program. Extending the power of privileged account security through new partners and technology integrations, customers can better protect against advanced threats through a deeper set of innovative cyber security solutions.

New C3 Alliance partners and integrations include Atos, Datablink, DB Networks, DBmaestro, EZMCOM, Flexera Software, Gemalto, Hexadite, Illusive Networks, Omada, OneLogin, Palo Alto Networks, Phantom, Proofpoint, Qualys, Radiant Logic, RSA, Stealthbits Technologies, SyferLock, Thales, Utimaco, Vistara and Yubico.

Launched in April 2016, the C3 Alliance was established to bring enterprise software, IT security and services providers together in order to deliver proactive protection, detection and response to customers by putting privileged account security at the core of their cyber security strategies. The program now has 45 partners and features 63 product integrations to increase the value of existing IT investments and improve security across enterprise priorities associated with cloud, identity security, application security, and endpoint.

“Because there is no silver bullet in security, CISOs are increasingly focusing on the value of an integrated security stack. The C3 Alliance helps drive value across existing IT investments through strategic integrations that take advantage of automation and the ability to streamline processes and data sharing,” said Adam Bosnian, executive vice president, global business development, CyberArk. “The escalation of damaging cyber attacks requires new levels of vendor collaboration. This is why the C3 Alliance continues to expand and prioritize vendor integration and alignment around privileged account security and data for more effective cyber security.”

Unmanaged Service Accounts, Application Security and the Attacker Opportunity

Organizations need to be better able to adapt to emerging cyber threats with proactive and responsive controls, especially those aimed at protecting privileged credential vulnerabilities that exist across applications and the IT security stack.

Extensive service account usage by commercial off-the-shelf and internally-developed applications, including identity and access management, DevOps, IT management, asset discovery and vulnerability scanning applications, creates a significant attack surface of unmanaged privileged credentials. Yet, awareness of this application security risk is disproportionately low, even though it may pose one the largest enterprise cyber security vulnerabilities.

Many of the newest C3 Alliance members and integrations focus on addressing the challenge of managing service accounts and privileged application credentials to better protect enterprise-class and SaaS applications that are critical to regular business operations and incident response.

“The interoperability between RSA® Identity Governance and Lifecycle and the CyberArk solution began as a centralized management approach for governing, managing and provisioning all user identities, including privileged identities and access entitlements,” said Jim Ducharme, vice president of Identity Products, RSA. “Today, we are expanding the interoperability with CyberArk to secure the privileged credentials used by RSA Identity Governance and Lifecycle to securely access target systems, such as servers and databases, to collect data and report for compliance and risk management across the enterprise and the cloud to deliver on the benefits of business-driven security.”

“Qualys’ integration with the CyberArk Privileged Account Security Solution helps customers using the Qualys Cloud Platform to simplify password management for authenticated scans across dynamic environments at large scale,” said Sumedh Thakar, chief product officer, Qualys, Inc. “By securely and centrally managing credentials for hybrid environments with a mix of cloud, on-premises and virtualized assets, organizations can automate scanning, increase accuracy and reduce compliance costs.”

“The Phantom security automation and orchestration platform connects in-house and third-party systems to help security operations gain better insight into potential threats across the IT environment, then reduce the time necessary to detect and respond,” Robert Truesdell, director of product management, Phantom. “Phantom apps require privileged credentials to access these systems and that powerful access must be managed and controlled in a consistent, scalable way. That’s where our integration with CyberArk becomes so valuable. As our platform continues to expand, we have to be able to centralize the management and security of these privileged application accounts to reduce the attack surface and keep credentials synchronized.”

C3 Alliance Drives Channel Opportunities

C3 Alliance members typically integrate with the CyberArk Privileged Account Security Solution. These integrations have expanded opportunities for reseller and system integration partners that can help customers further maximize existing IT investments by driving additional value and insight.

“Managing service accounts across multiple technologies continues to be a challenge that our clients face,” said Serafino Napoleone, director, Cyber Risk Services at Deloitte. “With expanding C3 Alliance integration capabilities, our clients are now able to automate and strengthen the Identity and Access Management controls on their existing technologies and platforms, while simultaneously benefitting from increased privileged account security and reduced vulnerability to cyber attacks.”

“Integrating privileged account security capabilities from CyberArk with other key technologies, such as identity and access governance, allows us to differentiate our business through high-value security services,” said Arun Kothanath, chief security strategist, DIT/Clango, Inc. “We view the C3 Alliance as a tremendous opportunity to deliver an expanding set of innovative solutions to our customers. These solutions help them prioritize privilege as part of their cyber security strategies, such as the ability to centrally manage all identities to mitigate risks and support compliance.”

Additional Resources

View a collection of C3 Alliance member videos: http://www.cyberark.com/c3-alliance-videos

For more information about the C3 Alliance, visit: http://www.cyberark.com/partners/technology-partners/

For companies interested in joining the C3 Alliance, visit: http://www.cyberark.com/contact/

eBook: An Attack Pathway Into Your Organization? There’s an App for That

About CyberArk

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including more than 45 percent of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the CyberArk blog, or follow on Twitter via @CyberArk, LinkedIn or Facebook.

# # #

About Stealthbits Technologies

Identify threats. Secure data. Reduce risk.

Stealthbits Technologies is a cybersecurity software company focused on protecting an organization’s credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.

Identify threats. Secure data. Reduce risk.

For more information, visit http://www.Stealthbits.com, email sales@Stealthbits.com , or call +1-201-447-9300.

The Stealthbits logo and all other Stealthbits product or service names and slogans are registered trademarks or trademarks of Stealthbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.


# # #

Media Contact:

Dan Chmielewski
Madison Alexander PR
Office: +1 714-832-8716
Mobile: +1 949-231-2965
dchm@madisonalexanderpr.com

© 2022 Stealthbits Technologies, Inc.