My organization specializes in IT security solutions for the finance and manufacturing sectors. We use CyberArk Endpoint Privilege Manager as a core component of our endpoint protection strategy, alongside other essential security measures such as network security, security operation center services, vulnerability management, credential management, and identity access management.
The organization's policy dictates what users can have on their laptops. For example, if the organization wants to limit certain applications, they can be blocked. The policy should define what users can have on their computers, such as restricting financial tools and applications to the finance team. These computers would be highly protected, with access to specific tools configured and restricted using CyberArk Endpoint Privilege Manager to safeguard sensitive data.
CyberArk Endpoint Privilege Manager enforces various security regulations. It includes a tool for comparing existing system configurations against those regulations and identifying any discrepancies. CyberArk actively ensures its software meets all relevant compliance standards.
CyberArk Endpoint Privilege Manager offers granular control over application access through customizable policies. These policies allow organizations to enforce the least privilege, block access entirely, or grant elevated privileges based on specific needs. Options include no access, least privilege access, and full access, ensuring that application permissions are tailored to individual users or groups and aligned with organizational security requirements.
The endpoint visibility is excellent. CyberArk Endpoint Privilege Manager is a discreet tool that runs in the background, monitoring application usage without impacting user experience. It remains invisible unless an unauthorized application is downloaded and installed. At this point, it blocks the installation and displays a message directing the user to contact IT support for assistance. This ensures that only approved applications are used and provides a clear path for users to request access to new tools.
We can use the discovery tool to identify all endpoints on the computers and compare that list with the computers running the EPM agent. This will reveal any computers without the EPM agent, which we can then deploy using the deployment tool.
CyberArk Endpoint Privilege Manager significantly reduces IT support calls by approximately 30 to 40 percent by preventing users from downloading unnecessary or malicious software. Without EPM, users with full admin privileges often install unauthorized applications, leading to increased support requests and potential virus infections. EPM allows IT to control and push only required software to computers, restricting unwanted applications. Additionally, EPM scans files and applications for viruses, blocking the installation of infected files and further reducing security risks and support calls. Overall, it helps reduce the number of IT service calls and the number of virus incidents by 30 percent.
CyberArk Endpoint Privilege Manager helps organizations meet compliance and regulatory requirements by addressing critical security concerns related to endpoint devices. Specifically, it mitigates the risk of credential theft, a common vulnerability across all endpoints. Additionally, it manages local accounts, a legacy practice where users create accounts directly on devices by rotating credentials automatically. This feature further enhances security by preventing unauthorized access, even if a hacker gains control of a device, rendering the compromised credentials useless.
CyberArk Endpoint Privilege Manager has saved approximately 20 to 25 percent of our time spent fulfilling compliance requirements. However, some areas require minor improvements that will be addressed in the future.
CyberArk Endpoint Privilege Manager significantly reduces the mean time to detect because it scans new objects immediately.
CyberArk helps reduce the number of privileged accounts by limiting privileged permissions on endpoint devices. Only the account used for software installation, such as local admin or domain admin, will have the necessary permissions, specifically for modifying registry settings during installation. This elevated access is required for certain software installations. However, these privileged accounts will not be used for regular login, internet browsing, or daily tasks. They are solely for backend application installation. Consequently, no other accounts will have privileged access to the endpoints.
CyberArk Endpoint Privilege Manager has significantly improved our security posture by preventing virus incidents and restricting users from downloading unwanted applications. This has reduced both virus-related incidents and data-loss incidents.
CyberArk Endpoint Privilege Manager helps reduce costs by minimizing service desk calls related to unwanted applications and virus incidents.
The time to value of CyberArk Endpoint Privilege Manager is evident immediately after deployment.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks. It safeguards data from unauthorized access by offering the least privileged access to endpoints and applications. This results in a 30 to 40 percent reduction in IT support calls, minimizes virus infections, and controls unauthorized software installations.
The CyberArk team is working on a feature to identify devices without the Endpoint Privilege Manager running, which is currently missing. Another enhancement needed is the scheduling of deployment, which I expect in future releases.
I have been using CyberArk Endpoint Privilege Manager product for about six years.
CyberArk Endpoint Privilege Manager is highly stable.
I findCyberArk Endpoint Privilege Manager to be scalable. The available reports and other security tools assist in scaling it according to my organization's needs.
The technical support is good.
I have used ManageEngine's PowerBroker tool in the past. However, CyberArk Endpoint Privilege Manager is a mature endpoint security tool that offers credential and access management, making it more comprehensive than competitors.
The implementation policy involved deploying the agent without restricting applications or elevated access, allowing us to gather data on all applications. Based on this data and organizational needs, a policy was configured to allow only authorized applications and block unwanted tools. A pilot group tested the policy by removing elevated access to ensure functionality. Once confirmed, elevated access and local admin rights were gradually removed from the remaining users based on team or group. Finally, crew link batches were removed for all users.
Integrating CyberArk Endpoint Privilege Manager with existing solutions can present moderate difficulty for those unfamiliar with EPM and its operational mechanisms.
Typically, two to three people are required for implementation, depending on the number of users and applications. The deployment can take six months to one year.
CyberArk Endpoint Privilege Manager provides good ROI by preventing significant financial losses from data breaches.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
I would rate CyberArk Endpoint Privilege Manager nine out of ten.
I recommend colleagues consider CyberArk Endpoint Privilege Manager. CyberArk offers flexible deployment options and is willing to negotiate to meet budgetary needs. Even with limited funding, organizations can start with a smaller deployment and expand it later based on their needs and budget availability.
Following the implementation of CyberArk Endpoint Privilege Manager, ongoing monitoring of new applications is crucial. This monitoring is essential for evaluating and configuring the system's policy, a manual process that must align with the organization's evolving application requirements. Continuous observation ensures the policy functions effectively and meets security standards.
I recommend gathering all applications and administrative rights information before implementing CyberArk Endpoint Privilege Manager. Using a centralized management tool for deployment facilitates the process.