Cyber-Ark Password Vault
February 01, 2007
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: This program is not needlessly complex.
Requires two pieces of hardware, which adds to overall cost of ownership significantly.
Cyber-Ark Password Vault delivers exactly what it promises. This is a program that stores the most sensitive passwords for an organization in a very secure fashion.
The Cyber-Ark Password Vault software is another example of implementing a subset of identity management features with a focus on simplicity. This program is designed to provide a secure vault for non-personal passwords. Examples of non-personal passwords would be firewall administration passwords, router configuration passwords, and Linux/UNIX root passwords. All of these passwords may be stored in a secure encrypted vault file on the Cyber-Ark server. The software is intended to be broken up between two physical hardware devices. The default installation of the vault software will install a personal firewall that will block all traffic not coming from the Cyber-Ark client.
The Cyber-Ark Password Vault was easy to install with a wizard guided set-up. There were no additional configuration changes that were necessary to the underlying Windows 2003 system. The Cyber-Ark software made all the changed needed to the system.
Documentation for this product is in the form of PDF files that are indexed and searchable. Most common topics were easy to find with good solutions provided. There was also a quick start guide that was included which made the installation quite easy.
Support for the Cyber-Ark products was difficult to find. There is little available through the Cyber-Ark website and common self support options like a knowledge base or FAQ is absent unless you purchase an optional maintenance plan. Cyber-Ark offers two maintenance plans at extra cost.
Priced at the upper end, the Password Vault product is definitely targeted toward enterprise installations.
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows
- Acer breach caused by improperly stored data
- Check Point tracks two waves of Cerber ransomware hitting U.S., UK
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- MIRCOP ransomware blames victim for attack, demands $28K ransom
- CYBERCOM 'reluctant' to cut off Islamic State internet
- Chinese tech professional caught selling secrets
- How 154M U.S. voter records will affect Americans' security - industry reacts