CyberArk integrates with Microsoft Defender for Identity

CyberArk integrates with Microsoft Defender for Identity

CyberArk announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organizations a unified, comprehensive view of their entire identity security landscape to allow quicker, more effective threat response and containment.

Defender for Identity is a cloud-based identity security solution that helps protect customers’ on-premises identities from advanced threats and manage identity risk. Fully integrated with Microsoft Defender XDR, it uses signals across hybrid identity environments and other workloads to help Security Operations (SecOps) teams better identify, detect and investigate advanced threats directed at their organization.

CyberArk Privileged Access Manager is a component of the CyberArk Identity Security Platform, providing best-in-class controls to discover, secure and measure privileged access for IT and cloud ops teams migrating, scaling and operating applications in hybrid and multi-cloud environments.

The integration between CyberArk Privileged Access Manager and Defender for Identity provides organizations with enhanced privileged access control and monitoring capabilities alongside streamlined privileged access workflows. By connecting data from diverse systems, Security Operations Center (SOC) and Identity teams will benefit from deeper investigative capabilities: quicker and more effective threat-hunting efforts, more precise attack path identification, and more comprehensive remediation options. These combined capabilities enable greater cyber resilience.

“Through the CyberArk C³ Alliance’s diverse ecosystem of partners, we continue to provide unparalleled protection for shared customers against identity-centric attacks,” said Clarence Hinton, Chief Strategy Officer at CyberArk. “CyberArk’s privileged access management integration with Defender for Identity allows organizations to maximize their existing investment and simplify their efforts to protect identities across their on-premises and multi-cloud environments.”

 

Cyber fallout from the Iran war

Cyber fallout from the Iran war

Tomáš Foltyn, security writer at ESET, highlights that the cybersecurity implications of…
How to avoid Apple Pay scams

How to avoid Apple Pay scams

Phil Muncaster, guest writer at ESET, explains…
Humanoids are the future of workforce

Humanoids are the future of workforce

Zeeshan Mehdi, Engineering Director for the Middle East at SoftServe,…
Google Announces Completion of Its $32 Billion Acquisition of Wiz

Google Announces Completion of Its $32 Billion Acquisition of Wiz

Google announced the completion of its $32 billion acquisition of Wiz, a leading…
Apply for Madinah Tech Cultivator till March 22

Apply for Madinah Tech Cultivator till March 22

Applications for the second cohort of the Madinah Tech Cultivator will close…
Armadin Secures Record Funding to Fight AI‑Driven Hyperattacks

Armadin Secures Record Funding to Fight AI‑Driven Hyperattacks

Armadin has raised an industry record $189.9 million in Seed and…