CyberArk and Code42 Automating Threat Response to Privileged Identities.
Matt Tarr

The techniques, tactics and procedures used by internal bad actors to bypass advanced security controls continue to evolve at a rapid pace. Whatever their motivation, malicious insiders have the knowledge of – and access to – an organization’s most sensitive information and in most cases, can legitimately bypass security measures with relative ease. Modern organizations must adopt a defense-in-depth approach with ‘privilege’ at its core to defend against advanced insider-based attacks. That’s why CyberArk and Code42 have joined forces to automate threat response to an organization’s privileged identities, reducing the risk of insider threats and establishing accountability for all privileged users. The joint solution will reduce the “Mean Time to Detect” and apply automation to improve your “Mean Time to Respond,” allowing your business to detect and respond to events that present significant risk to the business.


Attend this breakout session to learn how to:

  • BULLET ON INTEGRATION
  • Enable secure access and sessions from a centralized privileged access control point and automate session monitoring, recording and full audit
  • Minimize user privileges, and create policy that controls and monitors privileged accounts, credentials, and secrets
  • Implement automated remediation capabilities on privileged users that have been compromised