Truststream Security Solutions

CyberArk Core PAS

CyberArk provides Privileged Access Management (PAM) software that can operate in the cloud or a DC. It is an end-to-end solution that protects, manages and audits, user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to real-time privileged activity using intelligent threat analytics.

Features

  • Enterprise Password Vault (EPV)
  • Secure and tamper-proof digital vault with multiple security layers.
  • Privileged Session Manager (PSM)
  • Single-sign-on control point that isolates, records and audits privileged access
  • Application Access Manager
  • On-Demand Privileges Manager
  • SSH Key Management
  • Privileged Threat Analytics (PTA) module that integrates with SIEM systems
  • Intelligent real time audit with ability to respond to threats

Benefits

  • Manage Privilege at an Enterprise level through policy driven rules
  • Protect all privileged Accounts and SSH Keys
  • Control Access to Privileged Accounts
  • Secrets Management for Applications, Tools, Containers and DevOps
  • Comply with audit and regulatory requirements
  • Streamlined management of Privileged Accounts
  • Secure IAM Accounts and EC2 instances in AWS
  • Delivers Privileged Access Security (PAS)
  • Risk-based Credential Security and Session Management to Protect Against Attacks
  • Competitive with Thycotic, Bomgard, Centrify and BeyondTrust

Pricing

£31,000 to £500,000 an instance a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at paul.sullivan@truststream.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

7 2 8 2 6 1 6 0 5 7 6 9 3 6 2

Contact

Truststream Security Solutions Paul Sullivan
Telephone: 07949 502 435
Email: paul.sullivan@truststream.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Application Access Manager (AAM)
Secrets management for DevOps and automation processes, prevent hardcoded credentials
On-Demand Privileges Manager (OPM)
Control and monitor super users commands and replacement of SUDO
Endpoint Privilege Manager (EPM & EPM SaaS)
Server and Workstation least privilege, application control, credential theft protection
Cloud deployment model
  • Private cloud
  • Hybrid cloud
Service constraints
Supplied upon request, contact Truststream to arrange an initial needs assessment session to capture your service specific requirements
System requirements
  • Windows 2012 R2 SP1, Windows 2016
  • .Net Framework 4.5.2
  • IIS 8.5, 10.0
  • Internet Explorer 11.0, Chrome 56 and Higher
  • Microsoft Remote Desktop Services
  • Microsoft Remote Desktop Services Gateway
  • SUSE Linux Enterprise Server 11 SP4 or 12
  • CentOS Linux 5.6 +, 6.4 + and 7.x versions
  • Red Hat Enterprise Linux 5.6+, 6.4+ and 7.x versions

User support

Email or online ticketing support
Email or online ticketing
Support response times
Customers cases will be assessed and graded on receipt. The customer can also request an escalation to a case. Truststream operates 24x7 follow the sun support, so response times are the same at weekends.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
24x7 telephone support is provided by fully certified CyberArk Certified Delivery Engineers (CDE).

All customers are provided with a Technical Account Manager and a Customer Service Manager who are committed to helping you achieve the highest value, performance and results.

The latest system enhancements and updates. Including Alert announcements.

Truststream offers 3 different levels of support; CyberArk Enhanced 24x7 Telephone and Email Support, CyberArk Managed Upgrade Service & CyberArk Managed Operations.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
All customers are provided with operational guides, network design documents and customised training can be provided upon request.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
We do not hold any client data
End-of-contract process
If your maintenance contract expires then all users within your company will no longer be able to directly contact Support. All active Support cases will be put on hold until maintenance has been paid. Once maintenance is paid Support assistance will resume.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
The PAS Web Services is a RESTful API that enables users to create, list, modify and delete entities in Privileged Access Security solution from within programs and scripts. The main purpose of the PAS Web Services is to automate tasks that are usually performed manually using the UI, and to incorporate them into system and account-provisioning scripts.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The PAS Web Services SDK is a RESTful API that can be invoked by any RESTful client for various programming and scripting environments, including Java, C#, Perl, PHP, Python and Ruby.

Scaling

Independence of resources
CyberArk Core PAS is not a shared service. It is implemented as an individual instance per enterprise so there is complete independence from the demands of other businesses.

Analytics

Service usage metrics
Yes
Metrics types
Metrics include: transactions per second, number of users, average queue time, number of successful changes/verifications/reconciliations , number of failed change/verifications/reconciliations.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
CyberArk Software Limited

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
We do not hold customer data
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export metadata, but not passwords from the solution. Users are able to produce reports on activity using the web portal.
Data export formats
  • CSV
  • Other
Other data export formats
SIEM API
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
CyperArk's own secure protocol

Availability and resilience

Guaranteed availability
SLA's will be defined once the target operating model with the buyer is agreed. This will include service credits for non-performance.
Approach to resilience
There are many methods of designing resiliency into a CyberArk system. It is always a highly business-critical system and the CyberArk solution has evolved over many years to maximise availability and remove single points-of-failure. Further details are available on request.
Outage reporting
Public Dashboard & Email

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Available upon request
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
The British Assessment Bureau
ISO/IEC 27001 accreditation date
29/08/2018
What the ISO/IEC 27001 doesn’t cover
N/A scope is all services
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • Truststream is Cyber Essentials Plus certified
  • Truststream is IASME gold certified

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Available on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available on request
Vulnerability management type
Undisclosed
Vulnerability management approach
CyberArk implemented a process of scanning internal systems and identifying possible vulnerabilities.

Patches deployed by designated technical team, according to a deployment guidelines which are part of the procedure.
Protective monitoring type
Undisclosed
Protective monitoring approach
Available upon request
Incident management type
Undisclosed
Incident management approach
Available upon request

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Truststream is committed to fighting climate change through various directives such as being paperless, being part of the UK Gov cycling to work scheme and supporting hybrid working

Pricing

Price
£31,000 to £500,000 an instance a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full product on qualified 14- day proof-of-concept trial. The CyberArk Discover and Audit (DnA) module is also available to run free-of-charge to baseline and establish PAM requirements. Truststream can assist with this.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at paul.sullivan@truststream.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.