CyberArk logo

CyberArk

Proactively stops the most advanced cyber threats
13
25
+ 1
0

What is CyberArk?

It is the only security software company focused on eliminating cyber threats using insider privileges to attack the heart of the enterprise.
CyberArk is a tool in the Security category of a tech stack.
CyberArk is an open source tool with GitHub stars and GitHub forks. Here’s a link to CyberArk's open source repository on GitHub

Who uses CyberArk?

Companies

Developers
10 developers on StackShare have stated that they use CyberArk.

CyberArk Integrations

Sentry, Bugsnag, PagerDuty, Mingle, and Rafay Systems are some of the popular tools that integrate with CyberArk. Here's a list of all 5 tools that integrate with CyberArk.

CyberArk's Features

  • Email attachment protection
  • Credential protection and management
  • Session isolation and monitoring
  • Threat detection and analytics
  • End-to-end server protection
  • Domain controller protection
  • Activity monitoring
  • In-progress Kerberos attack detection

CyberArk Alternatives & Comparisons

What are some alternatives to CyberArk?
BeyondTrust
It supports a family of privileged identity management, privileged remote access, and vulnerability management products for UNIX, Linux, Windows and Mac OS operating systems.
Vault
Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.
Okta
Connect all your apps in days, not months, with instant access to thousands of pre-built integrations - even add apps to the network yourself. Integrations are easy to set up, constantly monitored, proactively repaired and handle authentication and provisioning.
SailPoint
It provides enterprise identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.
Centrify
It is privileged identity management and identity as a service solutions stop the breach by securing access to hybrid enterprises through the power of identity services.
See all alternatives

CyberArk's Followers
25 developers follow CyberArk to keep up with related blogs and decisions.