CyberArk Core PAS
CyberArk provides Privileged Access Management (PAM) software that can operate in the cloud or a DC. It is an end-to-end solution that protects, manages and audits, user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to real-time privileged activity using intelligent threat analytics.
Features
- Enterprise Password Vault (EPV)
- Secure and tamper-proof digital vault with multiple security layers.
- Privileged Session Manager (PSM)
- Single-sign-on control point that isolates, records and audits privileged access
- Application Access Manager
- On-Demand Privileges Manager
- SSH Key Management
- Privileged Threat Analytics (PTA) module that integrates with SIEM systems
- Intelligent real time audit with ability to respond to threats
Benefits
- Manage Privilege at an Enterprise level through policy driven rules
- Protect all privileged Accounts and SSH Keys
- Control Access to Privileged Accounts
- Secrets Management for Applications, Tools, Containers and DevOps
- Comply with audit and regulatory requirements
- Streamlined management of Privileged Accounts
- Secure IAM Accounts and EC2 instances in AWS
- Delivers Privileged Access Security (PAS)
- Risk-based Credential Security and Session Management to Protect Against Attacks
- Competitive with Thycotic, Bomgard, Centrify and BeyondTrust
Pricing
£31,000 to £500,000 an instance a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
7 2 8 2 6 1 6 0 5 7 6 9 3 6 2
Contact
Truststream Security Solutions
Paul Sullivan
Telephone: 07949 502 435
Email: paul.sullivan@truststream.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Application Access Manager (AAM)
Secrets management for DevOps and automation processes, prevent hardcoded credentials
On-Demand Privileges Manager (OPM)
Control and monitor super users commands and replacement of SUDO
Endpoint Privilege Manager (EPM & EPM SaaS)
Server and Workstation least privilege, application control, credential theft protection - Cloud deployment model
-
- Private cloud
- Hybrid cloud
- Service constraints
- Supplied upon request, contact Truststream to arrange an initial needs assessment session to capture your service specific requirements
- System requirements
-
- Windows 2012 R2 SP1, Windows 2016
- .Net Framework 4.5.2
- IIS 8.5, 10.0
- Internet Explorer 11.0, Chrome 56 and Higher
- Microsoft Remote Desktop Services
- Microsoft Remote Desktop Services Gateway
- SUSE Linux Enterprise Server 11 SP4 or 12
- CentOS Linux 5.6 +, 6.4 + and 7.x versions
- Red Hat Enterprise Linux 5.6+, 6.4+ and 7.x versions
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Customers cases will be assessed and graded on receipt. The customer can also request an escalation to a case. Truststream operates 24x7 follow the sun support, so response times are the same at weekends.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
24x7 telephone support is provided by fully certified CyberArk Certified Delivery Engineers (CDE).
All customers are provided with a Technical Account Manager and a Customer Service Manager who are committed to helping you achieve the highest value, performance and results.
The latest system enhancements and updates. Including Alert announcements.
Truststream offers 3 different levels of support; CyberArk Enhanced 24x7 Telephone and Email Support, CyberArk Managed Upgrade Service & CyberArk Managed Operations. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- All customers are provided with operational guides, network design documents and customised training can be provided upon request.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- We do not hold any client data
- End-of-contract process
- If your maintenance contract expires then all users within your company will no longer be able to directly contact Support. All active Support cases will be put on hold until maintenance has been paid. Once maintenance is paid Support assistance will resume.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- The PAS Web Services is a RESTful API that enables users to create, list, modify and delete entities in Privileged Access Security solution from within programs and scripts. The main purpose of the PAS Web Services is to automate tasks that are usually performed manually using the UI, and to incorporate them into system and account-provisioning scripts.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The PAS Web Services SDK is a RESTful API that can be invoked by any RESTful client for various programming and scripting environments, including Java, C#, Perl, PHP, Python and Ruby.
Scaling
- Independence of resources
- CyberArk Core PAS is not a shared service. It is implemented as an individual instance per enterprise so there is complete independence from the demands of other businesses.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Metrics include: transactions per second, number of users, average queue time, number of successful changes/verifications/reconciliations , number of failed change/verifications/reconciliations.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- CyberArk Software Limited
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- We do not hold customer data
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export metadata, but not passwords from the solution. Users are able to produce reports on activity using the web portal.
- Data export formats
-
- CSV
- Other
- Other data export formats
- SIEM API
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- CyperArk's own secure protocol
Availability and resilience
- Guaranteed availability
- SLA's will be defined once the target operating model with the buyer is agreed. This will include service credits for non-performance.
- Approach to resilience
- There are many methods of designing resiliency into a CyberArk system. It is always a highly business-critical system and the CyberArk solution has evolved over many years to maximise availability and remove single points-of-failure. Further details are available on request.
- Outage reporting
- Public Dashboard & Email
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Available upon request
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- The British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 29/08/2018
- What the ISO/IEC 27001 doesn’t cover
- N/A scope is all services
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Truststream is Cyber Essentials Plus certified
- Truststream is IASME gold certified
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Available on request
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
CyberArk implemented a process of scanning internal systems and identifying possible vulnerabilities.
Patches deployed by designated technical team, according to a deployment guidelines which are part of the procedure. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Available upon request
- Incident management type
- Undisclosed
- Incident management approach
- Available upon request
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Truststream is committed to fighting climate change through various directives such as being paperless, being part of the UK Gov cycling to work scheme and supporting hybrid working
Pricing
- Price
- £31,000 to £500,000 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full product on qualified 14- day proof-of-concept trial. The CyberArk Discover and Audit (DnA) module is also available to run free-of-charge to baseline and establish PAM requirements. Truststream can assist with this.