Cloud

3/12/2018
11:25 AM
50%
50%

CyberArk Buys Vaultive for Privileged Account Security Technology

The account security firm will use Vaultive's tech to protect privileged users at heightened risk for cyberattacks.

CyberArk today confirmed it has acquired certain assets of Vaultive, a privately held cloud security provider. The account security firm plans to build on Vaultive's technology to protect highly privileged account holders, who are frequent targets of cybercrime.

Specifically, CyberArk is focusing on its Privilege Account Security Solution, which already exists to block privileged account exploitation on-prem and in hybrid cloud environments. Vaultive will bring more visibility and control to privileged users and SaaS, IaaS, and PaaS administrators. It also brings a cloud-native and mobile experience to CyberArk's tool.

Both privileged users and SaaS, IaaS, and PaaS admins use a range of software and services that must be monitored. The idea behind this acquisition, terms of which were not disclosed, is to provide that monitoring in greater detail both on-prem and in the cloud.

Read more details here.

 

 

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
sasimon
50%
50%
sasimon,
User Rank: Apprentice
3/24/2018 | 12:54:38 AM
is all security secure?
I really enjoyed the post, do you have an article about the recent FB data leak? recharge plan API
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Google to Delete 'Secure' Label from HTTPS Sites
Kelly Sheridan, Staff Editor, Dark Reading,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The one you have not seen, won't be remembered".
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10653
PUBLISHED: 2018-05-23
There is an XML External Entity (XXE) Processing Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10654
PUBLISHED: 2018-05-23
There is a Hazelcast Library Java Deserialization Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10648
PUBLISHED: 2018-05-23
There are Unauthenticated File Upload Vulnerabilities in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10649
PUBLISHED: 2018-05-23
There is a Cross-Site Scripting Vulnerability in Citrix XenMobile Server 10.7 before RP3.
CVE-2018-10650
PUBLISHED: 2018-05-23
There is an Insufficient Path Validation Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.