Enterprise Password Vault Features & Benefits

Today we can store all identities in CyberArk's Enterprise Password Vault, verify authorized use, and automatically deactivate access to the accounts as soon as a staff member leaves the hospital's employ. Plus the software saves us a lot of time by enabling us to make updates in one central location.

Mary Travers
Data Security Analyst
Children's Hospital Boston

Features & Benefits:

Security and Audit Come First.

  • Uses CyberArk’s patented, ICSA certified Vaulting Technology®, which employs multiple built-in layers of security to protect privileged credentials.
  • Tamper proof audit logs and session monitoring for audit integrity.
  • Customizable “request workflows” for credential access approval including dual controls, integration with helpdesk ticketing systems and multiple additional parameters.
  • Flexible password policy management including password aging, complexity, versioning policy and archiving.
  • Out-of-the-box support for multi-factor authentication systems.
  • Automatic policy enforcement for the lifecycle of privileged accounts with the flexibility to easily enforce granular policies for specific compliance or business unit requirements.

Fast Time to Value and Ongoing Operational Efficiency.

  • Automated privileged identity management including discovery and provisioning, policy-based password changes, and access controls.
  • Out-of-the-box management of privileged credential access to over 100 operating systems, databases, firewalls, network devices, virtual environments, websites and cloud-based applications.
  • Extensible support for additional target systems with unique plug-in architecture for fast integration.
  • Automated password verification and reconciliation to minimize operational and incident response delays.

Enterprise-Proven Scalability and Manageability.

  • Scalable to manage hundreds of thousands of privileged accounts.
  • Central policy management with distributed enforcement points for multisite and segmented network deployments.
  • Built in disaster recovery and high availability.
  • Out of the box integration with enterprise infrastructure and security solutions including:
    • Directory services
    • Identity management solutions.
    • Authentication systems
    • Vulnerability scanners
    • Security information and event management systems
    • Helpdesk ticketing and workflow, ticketing & workflow, systems

Easy on the Users

  • Intuitive, role-based web interface.
  • Scheduled, pre-built audit reports on credential access and use and; policy compliance.
  • Access privileged credentials from mobile devices including credential requests and workflow approvals.
  • Direct connection to managed devices for users, eliminating the need to copy/paste privileged credentials.

Integrated with CyberArk Privileged Account Security Solution