Question |
What is Privileged Identity Management ? |
Answer |
Cyber Ark’s Privileged Identity Management (PIM) is secures, manages and logs all privileged accounts and usages associated with datacenter management . |
|
Question |
What is cyberark ? |
Answer |
CyberArk is the only security company focused on eliminating the most advanced cyber threats and that use insider privileges to attack the heart of the enterprise. CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. |
|
Question |
What are Cyber ark – Basic hardware requirements ? |
Answer |
Minimum of 4GB of RAM,2 X Windows Server 2008 R2 Service Pack 1,1 X Linux Machine (Red Hat 6.4 is preferred),VM Workstation or VM Player,Administrative rights on all Virtual Machines . |
|
Question |
|
Through Cyberarc is this possible to change password in dependancy?? |
|
Answer |
Yes its possible and in cyberark vault we can configure of domain group and domain privileges .. |
|
Question |
What are all the key features in cyber-ARK ? |
Answer |
Identify and understand the scope of the privileged account risk,Proactively protect and monitor access to privileged account credentials,Isolate critical assets from malware,Monitor all privileged account activity at the command level,Automatically enforce privileged account policies,Alert the security operations team to suspicious privileged activity in real-time,reduce cost of ownership with a single platform and management function & seamless user experience for privileged users |
|
Question |
On which platfoem cyber ark is built? |
|
Answer |
Windows and Linux based platform .. |
|
Question |
How to install this cyber Ark and its hardware/software requirement. |
Answer |
Its a package its contains PVWA and CPM and VAULT and basic OS . |
|
Question |
What are all the cyber ark components ? |
|
Answer |
|
PIM(privileged Identity manager), PSM – Privileged session manager, PVWA- Password vault web access, Vault,CPM(Central Policy manager ) |
|
Question |
Whether cyberark product possible to integrate with other security Solutions ? |
|
Answer |
Yes we can able to integrate with security solutions and few security solutions are Security Information and Event Management (SIEM),Vulnerability Management,Security Management Identity Provisioning . |
|
Question |
Can we Integrate Biometric for Authenticating to Cyber-Ark, Also whats the latest version and its benefits for Auditing and Recording ? |
Answer |
In current version there is no biometric feature available, might be upcoming version we can expect . We can use Privileged Session Management (PSM) isolates,controls and records all privileged administrator sessions and easily we can identify users and logs . |
|
Question |
What type of encryption algortihm using in cyberark ? |
Answer |
Default Encryption Algorithm –AES 256 bit & RSA 2048Key Hierarchy |
|
Question |
How many suites are available in Cyberark ? |
|
Answer |
|
There are two suites : PIM Privileged Identity management (PIM)and PSM Suites |
|
Question |
How Cyber-Ark helps in Enterprises level and what is the usage ? |
|
Answer |
Audit&Compliance ,Password Management for Applications and Real-time monitoring and root-cause analysis.. |
|
Question |
Can you name some cyber threats which are critically impact on business. |
Answer |
famous breaches are VeriSign attack .it impact undetectable malicious privileged user behavior enabling incident response teams to disrupt and quickly respond to an attack |
|
Question |
|
Whats the latest version of Cyber-Ark, and whats the new version benefit in terms of Auditing and Recording |
Answer |
Latest version is 7.0 and through PSM Privileged session manager we can record all the administrator access in real-time . |
Great Article
Cyber Security Projects for CSE Students
JavaScript Training in Chennai
Project Centers in Chennai
JavaScript Training in Chennai