{"id":47446,"date":"2021-11-10T15:21:00","date_gmt":"2021-11-10T15:21:00","guid":{"rendered":"https:\/\/www.commvault.com\/?p=47446"},"modified":"2024-01-16T10:31:05","modified_gmt":"2024-01-16T15:31:05","slug":"strengthening-data-access-security-with-cyberark","status":"publish","type":"post","link":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark","title":{"rendered":"Strengthening data access security with CyberArk"},"content":{"rendered":"\n

Every organization today is concerned about security and the inevitability of a ransomware attack. 64% of surveyed CISOs feel at risk of suffering a material cyber-attack in the next 12 months. With multi-generational data sprawl that increases the attack surface, recovering from a malicious attack in a consistent fashion becomes increasingly difficult.<\/p>\n\n\n\n

Through Commvault\u2019s multi-layered approach to data security and Intelligent Data Services platform, organizations can better manage ransomware risk and ensure their data is ready for business growth.  Commvault\u2019s deep interoperability with applications, databases, cloud, virtual, and container platforms ensures that a great variety of workloads are protected (hence the Commvault mantra of \u201cNever leave a workload behind\u201d).   This interoperability does require special privileged credentials, and that\u2019s why Commvault and CyberArk are combining to help organizations keep their data safe and recoverable from any threat.<\/p>\n\n\n\n

The challenge with managing privileged credentials<\/h3>\n\n\n
\n
\"\"<\/figure><\/div>\n\n\n

Managing privileged credentials is a difficult challenge for organizations and, when improperly handled, can lead to accounts getting exploited for malicious use such as data exfiltration, data loss, and corruption.<\/p>\n\n\n\n

Ransomware is especially notorious for relying on exploited credentials to spread and propagate within an environment. This puts production data as well as backup data at risk. Aggressive rotation policies provide a better level of security; however, there is greater risk of breaking interoperability within applications that rely on those credentials. <\/p>\n\n\n\n

Securing the privileged pathway<\/h3>\n\n\n\n

Together, Commvault and CyberArk are helping organizations solve this growing security issue head-on.<\/p>\n\n\n

\n
\"\"<\/figure><\/div>\n\n\n

Global Identity Security leader CyberArk pioneered privileged access management (PAM), a critical layer of IT security to protect data, infrastructure, and assets across the enterprise, in the cloud and throughout the DevOps pipeline. As attackers increasingly seek to exploit privileged credentials and elevated access to compromise high-value data, CyberArk has been at the forefront of protecting organizations and their most sensitive assets.  The company is trusted by the world\u2019s leading organizations, including more than 50 percent of the Fortune 500.<\/p>\n\n\n\n

With Commvault and CyberArk, organizations can reduce the risk of privileged account compromise by centrally managing credentials and enforcing strict password retention and rotation policies without affecting interoperability within the Commvault platform. CyberArk\u2019s privileged session management plugins support any application account used within Commvault as well as any local admin accounts.<\/p>\n\n\n\n

Privileged Session Management for secure administration<\/h3>\n\n\n
\n
\"\"<\/figure><\/div>\n\n\n

CyberArk has also integrated its privileged session management capabilities with Commvault. This provides secure administrative access to the Commvault management interface without ever exposing administrative credentials. This can be thought of as a password-less login session that isolates end users from direct access to target systems, as well as monitors and records the activity that occurs within the privileged session. The SecOP teams can manage local Commvault administrative credentials allowing them to implement stricter password complexity requirements and provide administrative access to Commvault without ever exposing the passwords to the end user.<\/p>\n\n\n\n

Improved RTO and RPO<\/h3>\n\n\n\n

With these key CyberArk integrations, #SecOps teams now have full control to enforce the policies required to keep an organization safe and compliant without any impact to Commvault operations. This greatly improves recovery point and time objectives within Commvault while improving security posture for the organization.<\/p>\n\n\n\n

These CyberArk plugins are available in the CyberArk Marketplace for CyberArk customers.\u00a0 They are supported on Commvault 11.19+ and above platforms. To download the plugins, head over to the CyberArk Marketplace<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Through Commvault\u2019s multi-layered approach to data security and Intelligent Data Services platform, organizations can better manage ransomware risk and ensure their data is ready for business growth.\u00a0 <\/p>\n","protected":false},"author":85,"featured_media":64366,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[678],"tags":[],"cmv_author":[861],"class_list":{"0":"post-47446","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ransomware","8":"cmv_author-david-cunningham","9":"entry"},"yoast_head":"\nStrengthening data access security with CyberArk<\/title>\n<meta name=\"description\" content=\"Through Commvault\u2019s multi-layered approach to data security and Intelligent Data Services platform, organizations can better manage ransomware risk and ensure their data is ready for business growth.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strengthening data access security with CyberArk\" \/>\n<meta property=\"og:description\" content=\"Through Commvault\u2019s multi-layered approach to data security and Intelligent Data Services platform, organizations can better manage ransomware risk and ensure their data is ready for business growth.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-10T15:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-16T15:31:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-david-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"957\" \/>\n\t<meta property=\"og:image:height\" content=\"548\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dpauciullo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@commvault\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dpauciullo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strengthening data access security with CyberArk","description":"Through Commvault\u2019s multi-layered approach to data security and Intelligent Data Services platform, organizations can better manage ransomware risk and ensure their data is ready for business growth.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark","og_locale":"en_US","og_type":"article","og_title":"Strengthening data access security with CyberArk","og_description":"Through Commvault\u2019s multi-layered approach to data security and Intelligent Data Services platform, organizations can better manage ransomware risk and ensure their data is ready for business growth.\u00a0","og_url":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2021-11-10T15:21:00+00:00","article_modified_time":"2024-01-16T15:31:05+00:00","og_image":[{"width":957,"height":548,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-david-.png","type":"image\/png"}],"author":"dpauciullo","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"dpauciullo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark"},"author":{"name":"dpauciullo","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e"},"headline":"Strengthening data access security with CyberArk","datePublished":"2021-11-10T15:21:00+00:00","dateModified":"2024-01-16T15:31:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark"},"wordCount":562,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-david-.png","articleSection":["Ransomware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark","url":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark","name":"Strengthening data access security with CyberArk","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-david-.png","datePublished":"2021-11-10T15:21:00+00:00","dateModified":"2024-01-16T15:31:05+00:00","description":"Through Commvault\u2019s multi-layered approach to data security and Intelligent Data Services platform, organizations can better manage ransomware risk and ensure their data is ready for business growth.\u00a0","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-david-.png","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-david-.png","width":957,"height":548},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/strengthening-data-access-security-with-cyberark#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Strengthening data access security with CyberArk"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e","name":"dpauciullo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","caption":"dpauciullo"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-david-.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/47446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=47446"}],"version-history":[{"count":11,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/47446\/revisions"}],"predecessor-version":[{"id":506361,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/47446\/revisions\/506361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/64366"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=47446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=47446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=47446"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=47446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}