Security company CyberArk has launched C3 Alliance last Thursday (28 April 2016) together with its global technology partners.
The inaugural members of C3 Alliance include BMC Software, Duo Security, FireEye, ForeScout, Intel Security, LogRhythm, Qualys, Rapid7, SailPoint, SecureAuth, Symantec, Tenable Network Security, Tripwire and Varonis.
According to CyberArk, these members have committed to incorporate privileged account security solution into their own offerings, and can leverage the privileged account data of CyberArk to deliver more valuable insight and threat response to customers.
"Privileged account security has become increasingly critical, since compromised privileged account credentials are a common denominator of many modern attacks," said Garrett Bekker, Senior Security Analyst at 451 Research. "With certified integrations between CyberArk and alliance members' products, the C3 Alliance should make it easier for customers to extend the power of privileged account security across their organisation and enhance their overall security posture," he continued.
According to Adam Bosnian, Executive Vice President on global business development at CyberArk: "The C3 Alliance brings together key enterprise and security software companies to deliver integrated, tested solutions to better protect our shared customers."
The CyberArk Privileged Account Security Solution helps deliver value to customers in the following areas:
- Proactive protection, in which customers benefit from knowing that the privileged accounts used to access their systems, as well as the general targets and critical applications accessed, are better secured and monitored.
- Faster detection - Identity and access governance, SIEM and security analytics platforms benefit from access to detailedprivileged activity dataand targeted analytics, as well as bi-directional communication to deliver improved, centralised, enterprise-wide monitoring and identification of critical security threats
- Intelligent response, which enables members to help their customers identify and respond to high-risk attacker activity in real time and carry out deeper forensics analysis and remediation activities.
Sign up for Computerworld eNewsletters.