InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Securing Secrets at Scale: Why Customers Are Moving Beyond HashiCorp

Presented by

Uzi Ailon, VP DevSecOps, CyberArk and Jeremy Patton, Senior Solutions Engineer, DevOps

About this talk

Securing machine identities is critical, as recently evidenced by the breach of the U.S. Treasury Department. In practice, we see that machine identities are not getting the same security prioritization as human identities. Over 40% of respondents to our Identity Security Threat Landscape Report note that their machine identities have access to sensitive data. The top challenge in securing machine identities is that for any business, over time, secrets silos have been scattered across multiple teams, environments and business units. Our customers often share that development teams are running their own instances of HashiCorp Vault, an approach that does not address the broader challenge of applying consistent security policies, providing a centralized visibility plane, and a clear audit trail for the entire organization. Moving from a siloed approach to a comprehensive machine identity strategy requires tools and organizational changes, regardless of whether teams are migrating from an individual free instance to HCP Vault Dedicated, Vault Enterprise, or to a completely different solution. Join us for a webinar featuring a live demo on (Insert Date), to learn about our new CyberArk capabilities to protect your machine identities. If you do not have a comprehensive secrets management strategy, or if you are customer running HashiCorp security products in your environment considering alternatives, this session is for you. We will discuss and provide a live demo how CyberArk can: • Secure secrets for your cloud native environments and business critical legacy applications • How customers transparently manage secrets across development teams and integrate into production environments • Maintain developer velocity • Provide immutable audit logging and secure storage for session recording • Support business continuity and break-the-glass with secrets replication and automated failovers
CyberArk

CyberArk

44212 subscribers208 talks
Don’t just manage identities. Secure them.
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.
Related topics