Industrial Organizations, Such as Manufacturers
and Energy Providers, Gain Secure Remote Access Benefits Along With
Greater Protection, Detection and Response Capabilities
Infosecurity Europe 2016 – Stand D140 – CyberArk (NASDAQ:
CYBR), the company that protects organizations from cyber attacks
that have made their way inside the network perimeter, today
announced new cyber security capabilities for industrial control
systems (ICS) to limit the progression of malware, better identify
privileged account-related risks, and improve remote access
security in industrial environments.
This Smart News Release features multimedia.
View the full release here:
http://www.businesswire.com/news/home/20160607005340/en/
What You Need to Know About Cyber Threats
to Industrial Control Systems (Photo: Business Wire)
Organizations in manufacturing and pharmaceutical sectors, as
well as those providing critical infrastructure like energy and
water utilities, benefit from new CyberArk Privileged Account
Security Solution capabilities to proactively protect their ICS
assets. CyberArk detects and contains cyber threats that could lead
to downtime or put consumer safety at risk.
Industrial organizations face greater cyber security challenges
today as traditionally air-gapped or segmented operational
technology (OT) networks become increasingly connected to IT
systems and the internet, exposing critical ICS endpoints and other
assets to aggressive threats like ransomware. According to a cyber
security study of UK C-level board members, utilities is one of the
sectors most exposed to cyber security risk when compared to other
key sectors of the economy.
Protect Against Malware and Ransomware AttacksAggressive
malware attacks targeting ICS have been a common denominator in
several recent attacks in the energy and utilities sector,
including the much-publicized power outage in the Ukraine and the
attack on the Gundremmingen nuclear power plant in Germany. In
other cases, highly threatening malware in the form of ransomware
has impacted facilities like the Lansing Board of Water & Light
(BWL), a Michigan municipal utility in the United States.
Of significant concern is the rise of ransomware attacks in the
industrial space. According to a report from The Institute for
Critical Infrastructure Technology (ICIT)1, “if a SCADA or ICS
system in an energy, utilities or manufacturing organization
becomes infected with ransomware, then lives could be jeopardized
in the time it takes to investigate the incident and return the
systems to operation.” The report continues, “without an adequate
investment in bleeding edge endpoint security solutions, ransomware
will likely cause more significant harm much sooner.”
Now also available for ICS assets as part of the CyberArk
Privileged Account Security Solution, CyberArk Viewfinity can help
customers defend against malware and ransomware attacks by
combining least privilege and application control to reduce the
attack surface and block malware progression. CyberArk Viewfinity
can help prevent malware from entering ICS computers such as
Human-Machine Interfaces (HMIs) and other assets where significant
damage can be done. It does this by automating the management of
local administrator privileges and controlling applications on
critical endpoints and servers.
According to the U.S. Department of Homeland Security2,
implementing application whitelisting in top-hierarchy control
computers such as HMIs represents one of the most critical steps in
securing an ICS network. To help mitigate the risk of malware-based
attacks, CyberArk Viewfinity enables organizations to control and
whitelist applications as well as remove local administrator rights
from HMIs; it seamlessly elevates privileges based on an
organization’s policy, as required by trusted (whitelisted)
applications.
Advancing Cyber Security in Industrial
EnvironmentsCyberArk delivers privileged account protection for
ICS by addressing the vulnerabilities originating from the
connectivity between ICS, the IT environments, the internet and
remote users. CyberArk helps customers in key ICS cyber security
areas such as:
- Secure and Monitor Remote Access
– In OT, supply chain management includes the oversight of users,
both internal and external to the organization, who require access
to ICS networks. This access often involves remote connectivity
sessions that can sometimes go unsecured and unmonitored for days
or weeks. Updates to the CyberArk Privileged Session Manager v9.7
enhance usability across Unix and Windows environments. CyberArk
Privileged Session Manager enables organizations to secure sessions
between a remote user and the ICS targets, while allowing these
sessions to be monitored and recorded. It also helps block the
spread of desktop malware and mitigates the risk of credential
theft.
- Identify Suspicious Activity –
Unusual user activity or unauthorized credential use to access the
ICS assets could be signs of an in-progress attack. CyberArk
Privileged Threat Analytics v3.1 learns typical patterns of
activity and continuously monitors privileged user and account
activity and can identify and alert on suspicious activity. The
alerts can be used by IT, OT and security teams to help detect,
automatically respond and disrupt in-progress attacks, dramatically
reducing any damage to operations and the business.
- Quantify the Risk and Reduce the
Attack Surface – The first step in mitigating the risk of
compromised credentials is for an organization to identify all
users, applications and associated credentials used for granting
access into the ICS. CyberArk Discovery and Audit is designed to
find privileged user and application accounts and credentials. The
tool generates a full report of scanned assets that includes a list
of accounts and associated credentials as well as account status
related to the company’s security policy.
“In a world where a manufacturing line could be tampered with to
impact the integrity of an automobile’s windshield or the efficacy
of a drug, or an attack that could bring transportation systems to
a halt, the implementation of risk-based cyber security programs
must accelerate,” said Roy Adar, senior vice president, product
management, CyberArk. “IT/OT convergence and related cyber security
risks can threaten uptime and consumer safety. Nearly all users in
ICS environments require some level of privileged access and are
therefore being targeted. Protecting ICS users and managing those
risks should more closely mirror IT privileged account security
best practices.”
Additional Resources
- Infographic - What You Need to
Know About Cyber Threats to Industrial Control Systems
http://goo.gl/Su177K
- Video - CyberArk Brief: How to
Address Common Security Risks in Industrial Control Systems (ICS)
https://goo.gl/k5EBQF
- White Paper - How CyberArk Can
Help Mitigate Security Vulnerabilities in Industrial Control
Systems http://goo.gl/2m7LNn
- White Paper - NIST 800-82
Revision 2: Guide to Industrial Control Systems (ICS) Security
http://goo.gl/wctCyx
- White Paper - Protecting the
Grid: Addressing NERC CIP v5 Requirements for Securing Privileged
Accounts http://goo.gl/g86NZ0
- Security Brief - Securing Remote
Vendor Access with Privileged Account Security
http://goo.gl/JWbKPu
On July 27, 2016 at 2:00 p.m. EDT, CyberArk will host a webinar
entitled, “Security Analysis Debrief of the Ukraine Power Grid
Attack.” To register, visit http://goo.gl/Dy42mQ.
To learn more about CyberArk Industrial Control Systems
Security, visit http://www.CyberArk.com/ICS.
1- The Institute for Critical Infrastructure (ICIT), “Combatting
the Ransomware Blitzkrieg: The Only Defense is a Layered Defense,
Layer One: Endpoint Security,” April 20162- Department of Homeland
Security – ICS-CERT, “Seven Steps to Effectively Defend Industrial
Control Systems,” December 2015
About CyberArkCyberArk is the only security company
focused on eliminating the most advanced cyber threats; those that
use insider privileges to attack the heart of the enterprise.
Dedicated to stopping attacks before they stop business, CyberArk
proactively secures against cyber threats before attacks can
escalate and do irreparable damage. The company is trusted by the
world’s leading companies – including more than 40 percent of the
Fortune 100 – to protect their highest value information assets,
infrastructure and applications. A global company, CyberArk is
headquartered in Petach Tikvah, Israel, with U.S. headquarters
located in Newton, Mass. The company also has offices throughout
EMEA and Asia Pacific and Japan. To learn more about CyberArk,
visit www.cyberark.com, read the company
blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or
Facebook at https://www.facebook.com/CyberArk.
Forward-Looking StatementsThis release may contain
forward-looking statements, which express the current beliefs and
expectations of CyberArk’s (the “Company”) management. In some
cases, forward-looking statements may be identified by terminology
such as “believe,” “may,” “estimate,” “continue,” “anticipate,”
“intend,” “should,” “plan,” “expect,” “predict,” “potential” or the
negative of these terms or other similar expressions. Such
statements involve a number of known and unknown risks and
uncertainties that could cause the Company’s future results,
performance or achievements to differ significantly from the
results, performance or achievements expressed or implied by such
forward-looking statements. Important factors that could cause or
contribute to such differences include risks relating to: changes
in the rapidly evolving cyber threat landscape; failure to
effectively manage growth; near-term declines in the Company’s
operating and net profit margins and its revenue growth rate; real
or perceived shortcomings, defects or vulnerabilities in the
Company’s solutions or internal network system, or the failure of
the Company’s customers or channel partners to correctly implement
the Company’s solutions; fluctuations in quarterly results of
operations; the inability to acquire new customers or sell
additional products and services to existing customers; competition
from IT security vendors; the Company’s ability to successfully
integrate recent and or future acquisitions; and other factors
discussed under the heading “Risk Factors” in the Company’s most
recent annual report on Form 20-F filed with the Securities and
Exchange Commission. Forward-looking statements in this release are
made pursuant to the safe harbor provisions contained in the
Private Securities Litigation Reform Act of 1995. These
forward-looking statements are made only as of the date hereof, and
the Company undertakes no obligation to update or revise the
forward-looking statements, whether as a result of new information,
future events or otherwise.
Copyright © 2016 CyberArk Software. All Rights Reserved. All
other brand names, product names, or trademarks belong to their
respective holders.
View source
version on businesswire.com: http://www.businesswire.com/news/home/20160607005340/en/
Media Relations Contacts:fama PRBrian Merrill,
+1-617-986-5005cyberark@famapr.comorCyberArkLiz Campbell,
+1-617-558-2191press@cyberark.comorInvestor Relations
Contact:CyberArkErica Smith, +1 617-630-6426ir@cyberark.com
CyberArk Software (NASDAQ:CYBR)
Historical Stock Chart
From Oct 2024 to Nov 2024
CyberArk Software (NASDAQ:CYBR)
Historical Stock Chart
From Nov 2023 to Nov 2024