CyberArk Delivers New Identity Security Offerings
March 09, 2021

CyberArk announced availability of new subscriptions, programs and tools designed to accelerate organizations’ Identity Security initiatives and time to business impact.

These new offerings complement CyberArk’s Identity Security portfolio, which is centered on Privileged Access Management and focuses on securing individual identities – human or machine – throughout the cycle of accessing critical assets.

Included in today’s announcement are:

- Identity Security Subscription Offerings – Available in three new subscription offerings, customers can benefit from the combined power of Identity as a Service (IDaaS) and the industry’s leading Privileged Access Management solution in offerings that make the most sense for their specific users: Workforce User, External Vendor or Privileged User.

- CyberArk Blueprint for Identity Security Success – The CyberArk Blueprint has evolved to expand prescriptive guidance across all identities and is centered on core Identity Security best practices gained through years of hands-on customer engagements.

- CyberArk Identity Security Assessment Tool – The Assessment Tool is fully aligned to the CyberArk Blueprint so organizations can assess and track their level of alignment with Identity Security best practices and compare their program maturity with peers across multiple parameters such as industry, region and organization size.

- Identity Security Customer Success Plans – Success Plans are strategically packaged resources, guidance and expertise to help customers successfully execute an Identity Security program while getting the most value from their solutions as quickly as possible.

“CyberArk continues to invest and execute on our vision for Identity Security, putting it at the center of major industry forces like digital transformation, cloud migration, attacker innovation and compliance,” said Udi Mokady, chairman and CEO, CyberArk. “CyberArk’s privilege-led approach to Identity Security is designed to help enterprises adapt and embrace a risk-based strategy for defending against identity-based attacks as they support a distributed workforce, embrace the cloud and new cloud technologies, and deliver positive customer experiences.”

Organizations across the globe are facing the challenge of an ever-expanding attack surface, as the number, types and interconnectedness of identities multiply across business applications and cloud workloads. Because these human and non-human identities can all become privileged under certain conditions, a new approach to Identity Security is required, one with Privileged Access Management at its core.

Using a Zero Trust model, every identity is authenticated and authorized before granting access. With CyberArk Identity Security, organizations can secure access across any device, anywhere, at just the right time through:

- CyberArk Privileged Access solutions secure privileged credentials wherever they exist – defending against advanced attacks, speeding digital transformation and helping achieve compliance.

- CyberArk Workforce Identity and Customer Identity solutions continuously monitor behavioral signals to make sure users are who they say they are.

- CyberArk Secrets Management solutions enable applications and automation tools to securely access sensitive resources at scale – without burdening developers.

Share this

Industry News

April 17, 2025

GitLab announced the general availability of GitLab Duo with Amazon Q.

April 17, 2025

Perforce Software and Liquibase announced a strategic partnership to enhance secure and compliant database change management for DevOps teams.

April 17, 2025

Spacelift announced the launch of Saturnhead AI — an enterprise-grade AI assistant that slashes DevOps troubleshooting time by transforming complex infrastructure logs into clear, actionable explanations.

April 16, 2025

CodeSecure and FOSSA announced a strategic partnership and native product integration that enables organizations to eliminate security blindspots associated with both third party and open source code.

April 16, 2025

Bauplan, a Python-first serverless data platform that transforms complex infrastructure processes into a few lines of code over data lakes, announced its launch with $7.5 million in seed funding.

April 15, 2025

Perforce Software announced the launch of the Kafka Service Bundle, a new offering that provides enterprises with managed open source Apache Kafka at a fraction of the cost of traditional managed providers.

April 14, 2025

LambdaTest announced the launch of the HyperExecute MCP Server, an enhancement to its AI-native test orchestration platform, HyperExecute.

April 14, 2025

Cloudflare announced Workers VPC and Workers VPC Private Link, new solutions that enable developers to build secure, global cross-cloud applications on Cloudflare Workers.

April 14, 2025

Nutrient announced a significant expansion of its cloud-based services, as well as a series of updates to its SDK products, aimed at enhancing the developer experience by allowing developers to build, scale, and innovate with less friction.

April 10, 2025

Check Point® Software Technologies Ltd.(link is external) announced that its Infinity Platform has been named the top-ranked AI-powered cyber security platform in the 2025 Miercom Assessment.

April 10, 2025

Orca Security announced the Orca Bitbucket App, a cloud-native seamless integration for scanning Bitbucket Repositories.

April 10, 2025

The Live API for Gemini models is now in Preview, enabling developers to start building and testing more robust, scalable applications with significantly higher rate limits.

April 09, 2025

Backslash Security(link is external) announced significant adoption of the Backslash App Graph, the industry’s first dynamic digital twin for application code.

April 09, 2025

SmartBear launched API Hub for Test, a new capability within the company’s API Hub, powered by Swagger.

April 09, 2025

Akamai Technologies introduced App & API Protector Hybrid.