Posts

Showing posts with the label Identity and Access Management

How to Map Identity Security Maturity and Elevate Your Strategy

Image
The ultimate goal of Identity Security is to provide secure access to every identity for any resource or environment, from any location, using any device. Yet ever-evolving technology and dynamic threats can make executing a comprehensive Identity Security program a complex undertaking. According to the new Enterprise Strategy Group (ESG) research report “The Holistic Identity Security Maturity Model,” most organizations (42%) are still in the early days of their Identity Security journeys. Understanding your business’s current Identity Security maturity in relation to its ideal state is vital because, in the words of Henry Kissinger, “If you do not know where you are going, every road will get you nowhere.” So, where do you start? What assessment factors matter most? How do you stack up against industry peers and track improvement over time? To help eliminate some of this guesswork, ESG created a data-driven Identity Security Maturity Model that measures maturity levels across four di...

Gaining Privileged Access Management Insights with the CyberArk Telemetry Tool

Image
Operationalizing security tools into security programs requires proper insight into what’s going on. You need to understand what’s happening within the service in order to compare it to your plan, simply be informed, or help tell your program’s story. A critical piece of telling that story is done through the collection of metrics and data to support it. IT Security Teams are constantly under pressure to deliver and show progress, often with a lack of resources to do so. Which means engaging with business intelligence and analytics teams can be challenging for some, you may not even have a team to support this function, or you lack the proper tools to do it yourself. In all of those scenarios, it’s hard to gain the proper insight into your service that you need. Introduction The CyberArk Telemetry Tool provides customers with the much-needed insight into the usage of their CyberArk Privileged Access Manager (Privileged Cloud or Self-Hosted)      services. The Telemet...