Overview

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world's leading companies - including 45 percent of the Fortune 100. CyberArk's dedicated team based in Washington, D.C. works closely with many U.S. Federal agencies to help protect their highest value information assets, infrastructure and applications.

CyberArk is certified by, compliant with, listed on: DoD UC APL, DHS CDM, Common Criteria, NERC-CIP, HSPD-12, Army CoN, ITES, NIST 800-171, NIST 800-53, NIST 800-82

CyberArk's U.S. headquarters are located in Newton, Mass. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.

Products

The CyberArk Privileged Account Security Solution includes the following products:

  • Enterprise Password Vault® fully protects privileged credentials based on privileged account security policy and controls for who can access which passwords, and when.
  • Privileged Session Manager® isolates, controls, and monitors privileged user access as well as activities for critical UNIX, Linux, and Windows-based systems, databases, and virtual machines.
  • Privileged Threat Analytics™ analyzes and alerts on previously undetectable malicious privileged user behavior enabling incident response teams to disrupt and quickly respond to an attack.
  • Application Identity Manager™ eliminates hard-coded credentials, including passwords and encryption keys from applications, service accounts and scripts with no impact on application performance.
  • On-Demand Privileges Manager™ allows for control and continuous monitoring of the commands super-users run based on their role and task.

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


Federal Contracts

ITES-SW

Vendor(s): CoN Certified Term: March 2015-March 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through September 30, 2017

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Florida - Palm Beach County

Through April 30, 2019

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

VASCUPP

Contract Number: UVA1482501 Contract Term: May 2, 2014– December 19, 2021


Events

Archived Events

News

Latest News

Carahsoft was recognized during the 2017 Americas Partner Excellence Awards at the 11th annual CyberArk Impact Americas Summit, the world’s largest event for privileged account security advocates.
READ MORE >
CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced the CyberArk Privileged Account Security ...
READ MORE >
Cyber-Ark® Software, a leading global information security provider for protecting and managing privileged accounts and sessions, critical applications and sensitive information, today announced it ...
READ MORE >

Resources

This CyberArk white paper will: ? Outline several increasingly prevalent Kerberos attack methods, which can enable control over a target’s network by commandeering the domain controllerPresent strategies to help reduce and block an attacker’s progress at two critical phases of the attack lifec...

Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Inst...

Malicious hackers are wreaking havoc across the globe with advanced cyber attacks that are well planned, sophisticated, and directly targeted at the most valuable core assets of an enterprise. The outsiders are breaking through the perimeter and endpoint defenses and gaining internal access. Once ...

This webinar focuses on The White House’s recent “30-Day Cyber Security Sprint”, specifically on how to tighten policies and practices for privileged users and addressing insider threat.The webinar focuses on specific guidelines from the White House document that CyberArk’s Privileged Accoun...

Isolate, control and monitor all privileged administrator sessions to protect your databases, virtual environments, network devices and servers from insider threats and external cyber attacks and provide proof to your auditors around privileged session activity.