The Privileged Identity Management (PIM) Suite is a full life-cycle solution for securing, managing, automatically changing and monitoring all activities associated with Privileged Accounts.
In today's environment, organizations spend a lot of resources building an infrastructure for securing the enterprise and assuring their business continuity and compliance. Every typical IT environment comprises of hundreds or thousands of servers, databases, network devices and more, all controlled and managed by a variety of privileged and shared identities - also known as break-glass, emergency or fire IDs - which are the most powerful in any organization. This includes the Root account on UNIX/Linux, Administrator in Windows, Cisco Enable, Oracle system/sys, MSSQL SA and many more. Ironically, these identities are often neglected, difficult to monitor their session activities, and passwords are never changed. In some cases, these identities are required not only by the internal IT personnel, but also by external 3rd party vendors and, thus, require extra care, such as secure remote access and secure session initiation without exposing the credentials. Powerful passwords are also often found hard coded inside applications, scripts and parameter files, leaving them unsecured, rarely changed and visible to the world. As the "Keys to the Kingdom", mismanagement of privileged identities impose great risks to organizations:

The Cyber-Ark's Privileged Identity Management Suite, a full life-cycle solution for managing the most privileged accounts in the enterprise, enables organizations to secure, provision, manage, control and monitor all activities associated with all types of Privileged Identities such as administrator on a Windows server, Root on a UNIX server, Cisco Enable on a Cisco device, as well as embedded passwords found in applications and scripts. Privileged passwords, as well as the audit information associated with using them, must be protected according to the highest security standards. The Cyber-Ark PIM Suite utilizes the Patented Digital Vault®, certified as highly secure by independent security evaluators (such as ICSA Labs). This core technology is the heart of the PIM suite and was designed to meet the highest security
requirements for controlling the "keys to the kingdom". The Digital Vault provides numerous underlying security capabilities for authentication, encryption, tamper-proof audit and data protection.
The Cyber-Ark PIM Suite includes the following products:

With Cyber-Ark PIM Suite, enterprises can easily:

From streamlining password management to delivering the rock-solid security of a Digital Vault, the many benefits of the Privileged Identity Management Suite are powered by a robust set of system capabilities, such as:
Security and Audit
Shared and Administrative Account Management
Application Identity Management
Privileged Session Management
Enterprise Readiness

The Cyber-Ark PIM Suite includes a rich set of auditing reports, such as the one pictured here. Additional audit features include the ability to track time, date, a personalized identity, changes made and logging history.
Reports are available to auditors in self-service formats or exportable to Microsoft Excel.







