News | August 14, 2012

Cyber-Ark Launches Version 7 Of Its Sensitive Information Management Suite To Enhance Security Of Files In-Transit

Facing New Audit and Cybersecurity Pressures, Large Enterprises Trust Cyber-Ark for the Secure Exchange of Their Most Sensitive Information

NEWTON, Mass. – Cyber-Ark® Software today announced version 7 of its Sensitive Information Management Suite to support secure file exchange environments. Influenced by increasing audit and cybersecurity pressures, a growing number of global enterprises rely on Cyber-Ark’s Sensitive Information Management Suite to break away from known email and file transfer protocol (FTP) vulnerabilities that put them at risk from external threats while better supporting compliance requirements, such as PCI.

Cyber-Ark’s Sensitive Information Management Suite isolates sensitive data sent over the Internet, enabling organizations to securely and efficiently exchange sensitive information with their business partners, customers, suppliers and subcontractors using ad-hoc, manual or automated file transfer through a single platform. Version 7 includes capabilities to securely send emails from any browser for increased mobility, expanded enterprise integration for its Secure Email Manager solution with Data Loss Prevention (DLP) software, and enhanced monitoring of system health for quicker recovery and streamlined system management.

Making the Case for More Secure File Sharing

According to Gartner, by 2015, 50 percent of midsize and large organizations will deploy solutions to manage large file attachments for emails, file exchange portals, file sharing and collaboration, and file access and management via mobile devices.1 Cyber-Ark provides a superior, more comprehensive alternative to common file exchange technologies like email and FTP that are being increasingly scrutinized by auditors and vulnerable to attackers. Within the last year, organizations like Yale University and Acer suffered data breaches by failing to secure their FTP server. According to the Trustwave® 2012 Global Security Report, FTP was the second most likely protocol to be used for data exfiltration by malware in 2011, behind HTTP. Also, with changes that went into effect last year, auditors concerned with PCI compliance are failing organizations that don’t demonstrate adequate controls around their FTP.

Sensitive Information Management in Action

Cyber-Ark customers choose the Sensitive Information Management Suite to support a variety of business uses including secure unlimited sized attachments over email, file exchange portals, file sharing and collaboration with external parties, support for mobile device users, and file transfer automation for business-to-business integration.

To further understand how organizations are utilizing the Sensitive Information Management Suite, consider the case of one major investor services organization that was in need of a secure way to deliver highly-sensitive, unstructured data to external clients and partners. The organization was already utilizing Cyber-Ark’s Privileged Identity Management Suite. By extending its relationship with Cyber-Ark and implementing the Sensitive Information Management Suite, the organization can now safely share confidential information with clients and third parties within the same technology environment, without compromising its information security policy.

In another case, a leading payroll service provider relies on Cyber-Ark to provide a secure portal in which small organizations can submit payroll files for processing. The provider extends access to the Sensitive Information Management Suite to larger customers to enable them to automate payroll processing. New features enable those organizations to securely monitor the information transfer process to provide greater visibility into whether the process is complete, or stalled. The payroll services provider benefits from not having to make trade-offs between the user experience, security and efficient business operations.

“Whether the catalyst is compliance, cybersecurity or protecting file sharing in increasingly mobile environments, global organizations are making secure file exchange a greater priority based on well-known weaknesses with existing technologies and easy-to-exploit vulnerabilities,” said Roy Adar, vice president of product management, Cyber-Ark Software. “We continue to introduce new innovations within our Sensitive Information Management Suite to minimize risk and improve audit performance. We are also seeing increasing adoption among customers that have invested in our privileged identity management solutions to further extend their security beyond the perimeter of their organization.”

Availability

Cyber-Ark’s Sensitive Information Management Suite version 7 is available now - on premise or as a cloud service. For more information, contact sales@cyber-ark.com or 1-888-808-9005 or +1 (617) 965-1544.

1Source: Gartner, “Four Common User Scenarios that Demand MFT,” May 2012, p1

About Cyber-Ark
Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments. Cyber-Ark works with more than 1,100 customers, including more than 35 percent of the Fortune 100. Headquartered in Newton, Mass., Cyber-Ark has offices and authorized partners in North America, Europe and Asia Pacific. For more information, please visit www.cyber-ark.com.

SOURCE: Cyber-Ark Software, Inc.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.