CyberArk launches Identity-Centric Secure Browser

CyberArk has introduced CyberArk Secure Browser, said to be the industry’s first identity-centric secure browser, providing enhanced security and privacy alongside a familiar, productive user experience.

  • 8 months ago Posted in

Backed by intelligent privilege controls and simple to deploy across devices, CyberArk Secure Browser is purpose-built for a cloud-first world, providing secure, consistent access to both on-premises resources and SaaS applications. It allows unprecedented visibility, control, and governance for security teams, helping to prevent the malicious use of compromised identities, endpoints and credentials both at and beyond login. Secure Browser is a component of the CyberArk Identity Security Platform, enabling secure access for any identity — human or machine — to any resource or environment from anywhere, using any device.

A recent survey of UK office workers highlighted lack of confidence in their organisation’s security tools:

· More than half (55%) UK workers think their organisation’s IT teams will not be able to defend against their sensitive data being collected and wrongly used without their knowledge.

· 55% also believe IT teams won’t be able to stop cyberattackers stealing their work login details and access confidential information.

Available to customers of the CyberArk Identity Security Platform, CyberArk Secure Browser safeguards the organisation’s most valuable resources, enabling a secure passwordless experience, easy access to privileged information and assets and helping to prevent breaches resulting from cookie theft and session takeover attacks. Recent major security breaches and new research from CyberArk Labs demonstrates how easy it is for techniques like cookie theft to give threat actors unauthorised access to sensitive data and assets, completely bypassing authentication tools. Secure Browser can ensure that there are no cookies to steal.

“Increased usage of remote access, SaaS applications and cloud infrastructure created a security blind spot for us, prompting a rethink of our security posture and investment in tools to secure unauthorised access to critical assets via our distributed workforce,” said Chris Dove, Enterprise Architect, California Department of Finance. “Adding CyberArk Secure Browser to our existing CyberArk deployment will allow us to strictly enforce security policies without sacrificing productivity. We will be better able to safeguard our data, making sure employees can only access work systems through a secure, isolated browser that rotates passwords and keeps them from being saved – and potentially stolen.”

CyberArk Secure Browser Addresses Key Enterprise Cybersecurity Challenges

· Secures all access – including privileged and sensitive access – from the browser

· Fully integrates with the organisation’s entire Identity and Access Management and security architecture

· Provides a secure and safe way for users to access corporate resources from their own or unmanaged devices

· Separates work and personal applications and domains

· Enables easy, quick resource access for all user types, including high-risk groups

· Streamlines ability to meet regulatory and audit requirements

“The proliferation of SaaS apps, cloud-native resources and business-critical applications that are accessed from the browser introduce new and significant risks that attackers have been quick to take advantage of,” said Matt Cohen, CEO, CyberArk. “Traditional access management approaches lack the right controls at the edge to be able to see and secure the complete identity journey, end-to-end. We are excited to deliver an enhanced enterprise browser that boosts productivity and layers on additional security and privacy controls to the most frequently used application in most organisations. This is just another example of how CyberArk is extending identity security to all users no matter how they access sensitive data and assets.”

Predictive maintenance and forecasting for security and failures will be a growing area for MSPs...
Venafi has published the findings of its latest research report: The Impact of Machine Identities...
Arctic Wolf to enhance its Security Operations Aurora Platform with best-in-class endpoint...
Nearly 50% of organisations have experienced a security breach in the last two years.
New study by Splunk shows that a significant number of UK CISOs are stressed, tired, and aren’t...
HP Wolf Security Study highlights cybersecurity challenges facing organizations across the...
Internal test shows estimated scanning speeds of 75,000 backups within 60 seconds.
Deployment allows Korea Hydro and Nuclear Plant (KHNP) to leverage quantum-safe MACsec technology...