Cyber-Ark
Encyclopedia
Cyber-Ark Software, Inc. is an Israeli-American information security
Information security
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction....

 company that develops and markets digital vaults, based on their vaulting technology for securing and managing privileged passwords
Privileged password management
Privileged password management software may be deployed by organizations to secure the passwords for login IDs that have elevated security privileges. This is most often done by periodically changing every such password to a new, random value...

 and Privileged identities
Privileged Identity Management
Privileged Identity Management is a domain within Identity Management focused on the special requirements of powerful accounts within the IT infrastructure of an enterprise. It is frequently used as an Information Security and governance tool to help companies in meeting compliance regulations and...

 (PIM), and sensitive information within and across enterprise
Business
A business is an organization engaged in the trade of goods, services, or both to consumers. Businesses are predominant in capitalist economies, where most of them are privately owned and administered to earn profit to increase the wealth of their owners. Businesses may also be not-for-profit...

 networks
Computer network
A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information....

. Cyber-Ark’s technology is deployed worldwide – primarily in the Financial Services
Financial services
Financial services refer to services provided by the finance industry. The finance industry encompasses a broad range of organizations that deal with the management of money. Among these organizations are credit unions, banks, credit card companies, insurance companies, consumer finance companies,...

, Energy
Energy
In physics, energy is an indirectly observed quantity. It is often understood as the ability a physical system has to do work on other physical systems...

, Retail
Retail
Retail consists of the sale of physical goods or merchandise from a fixed location, such as a department store, boutique or kiosk, or by mail, in small or individual lots for direct consumption by the purchaser. Retailing may include subordinated services, such as delivery. Purchasers may be...

 , and Healthcare enterprises.

Cyber-Ark works with more than 900 global customers, including more than 35 percent of the Fortune 50 and 7 of the 10 largest banks worldwide.

Cyber-Ark is a venture
Venture capital
Venture capital is financial capital provided to early-stage, high-potential, high risk, growth startup companies. The venture capital fund makes money by owning equity in the companies it invests in, which usually have a novel technology or business model in high technology industries, such as...

-backed company. A list of its current investors includes Seed Capital Partners, Cabaret-ArbaOne, Jerusalem Venture Partners
Jerusalem Venture Partners
Jerusalem Venture Partners is an Israeli-based venture capital firm, with offices in the JVP Media Quarter in Jerusalem and in New York City.-History:...

 (JVP), JP Morgan/Chase Partners and Vertex Venture Capital.

History & general timeline

Cyber-Ark was founded in 1999 by Alon Cohen, Udi Mokady and a team of security
Security
Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition. The Institute for Security and Open Methodologies in the OSSTMM 3 defines security as "a form of protection...

 technologists in Israel
Israel
The State of Israel is a parliamentary republic located in the Middle East, along the eastern shore of the Mediterranean Sea...

, who worked to develop the Digital Vault. The technology combines multiple layers of security which resides within an existing network perimeter and focuses around data itself, creating a central repository
Repository (publishing)
A repository in publishing, and especially in academic publishing,is a real or virtual facility for the deposit of academic publications, such as academic journal articles....

 to share and store proprietary
Property
Property is any physical or intangible entity that is owned by a person or jointly by a group of people or a legal entity like a corporation...

 or confidential data. The Digital Vault was created to exist separately from the network, whether placed within or outside the infrastructure
Infrastructure
Infrastructure is basic physical and organizational structures needed for the operation of a society or enterprise, or the services and facilities necessary for an economy to function...

 and serves as the foundation for all of Cyber-Ark’s following technology products.

In April 2006 Cyber-Ark’s digital vaulting platform was tested by ICSA Labs and verified as a secure, encrypted file storage and sharing environment.

On July 9, 2006, Cyber-Ark expanded its European presence by opening a new UK headquarters in London
London
London is the capital city of :England and the :United Kingdom, the largest metropolitan area in the United Kingdom, and the largest urban zone in the European Union by most measures. Located on the River Thames, London has been a major settlement for two millennia, its history going back to its...

. Later that year, on December 21, the Company moved its corporate headquarters to Newton, MA.

On January 30, 2007, Cyber-Ark co-founded the PCI Security Vendor Alliance along with seven other companies to educate U.S. companies on the compliance regulation
Regulation
Regulation is administrative legislation that constitutes or constrains rights and allocates responsibilities. It can be distinguished from primary legislation on the one hand and judge-made law on the other...

 and technology tools for compliance
Compliance (regulation)
In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Regulatory compliance describes the goal that corporations or public agencies aspire to in their efforts to ensure that personnel are aware of and take steps to comply with relevant laws and...

.

On September 28, 2010, Cyber-Ark joined the Cloud Security Alliance to help promote best practices and support educational initiatives associated with creating and maintaining secure cloud computing environments.

Technology Development Timeline

  • September 2000, Launch of first product based on the Digital Vault technology, the PrivateArk Vault.
  • May 2002, Digital Vault technology awarded a U.S. patent.
  • June 2002, Availability announced for the first Sensitive Document Vault (originally launched as “PrivateArk Network Vault”) and first Inter-Business Vault (originally launched as “PrivateArk Inter-Business Vault”).
  • June 2003, Availability of the Enterprise Password Vault (originally launched as “Network Vault for Passwords) is announced.
  • November 2005, Central Password Manager for Network Vault is unveiled.
  • August 2006, Announced the availability of the appliance offering for its Enterprise Password Vault.
  • October 2006, Enterprise Password Vault v4.0 released.
  • October 2008, Inter-Business Vault v5.0 is made publicly available.
  • March 2009, New Privileged Session Manager solution announced as part of Privileged Identity Management Suite v5.0.
  • September 2009, Inter-Business Vault v5.5 released.
  • September 2009, Privileged Identity Management Suite v5.5 features new version of the Application Identity Manager.
  • April 2010, Privileged Identity Management Suite v6 features new On-Demand Privileges Manager.
  • November 2010, Secure Email Manager announced as part of version 6 of the Governed File Transfer Suite
  • February 2011, The new Privileged Session Management Suite is launched.
  • September 2011, Inter-Business Vault® as a Service is announced, a cloud-based solution for rapidly exchanging sensitive files with external third parties

Products

  • Inter-Business Vault - a secure Governed File Transfer solution
  • Sensitive Document Vault - a repository for securing, storing and managing confidential documents
  • Privileged Identity Management Suite - secures, manages and monitors all activities associated with powerful privileged accounts. Includes the following solutions: Enterprise Password Vault, Application Identity Manager and On-Demand Privileges Manager
  • Privileged Session Management Suite - isolates, controls and records privileged access to databases, virtual environments and servers
  • Governed File Transfer Suite - secure solution for protecting and managing the exchange of critical business information. Features the Secure Email Manager

Executive Officers

  • Udi Mokady: Founder, President & CEO
  • Alon N Cohen: Active Chairman & Founder, former head of the System and Security Department for the Israeli military
  • Nir Gertner: Chief technical officer
    Chief technical officer
    A chief technology officer is an executive-level position in a company or other entity whose occupant is focused on scientific and technological issues within an organization....

  • Chen Bitan: General Manager
    General manager
    General manager is a descriptive term for certain executives in a business operation. It is also a formal title held by some business executives, most commonly in the hospitality industry.-Generic usage:...

     EMEA and Vice President of R&D
  • Roy Adar: Vice President of Product Management
    Product management
    Product management is an organizational lifecycle function within a company dealing with the planning, forecasting, or marketing of a product or products at all stages of the product lifecycle....

  • Adam Bosnian: Vice President of Products, Strategy, and Sales
  • Richard A Weeks: Vice President of Business Development

Further reading




The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK