Solved

Cyber Ark Implementation/Deployment

Posted on 2014-02-25
4
7,684 Views
Last Modified: 2014-03-12
Hi ,

I am new to cyber Ark.We need to deploy cyber-ark privilege identity/account management and on board existing active directory accounts on it.I tried to  search on internet but not found any product guide or deployment guide except few introductory docs.Can you please help?

Any links to admin/deployment guide or training would be great..

Regards,
Rtantra
0
Comment
Question by:Rahul Patil
  • 3
4 Comments
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
ID: 39888474
Likely you are exploring the below product offering

Privileged Identity Management (PIM) Suite – comprehensive lifecycle management for
privileged, shared and application accounts across the datacenter.

Privileged Session Management (PSM) Suite–isolates, controls and monitors privileged sessions on servers, databases or virtual environments, providing a pre-integrated solution with PIM.

Sensitive Information Management (SIM) Suite–manages and protects sensitive information whether being shared within the organization or sent to external parties

You may want to check out the below

A) The slides for the product suite depicting PIM and PSM, there is some logical diagram (slide 22) and screenshot of the actual mgmt console (alerts etc) but in term of deployment guide it is not published though.

Primarily, PIM is the overarching consisting the overall password vault (PVWebAccess-PVWA), application identity mgr (AIM) and the on-demand privileged mgr (OPM). it lay the foundation and PSM further give granular mgmt control over the identified privileged users such as your sysadmin to the various appl servers. Note it cannot replaced the enterprise identity mgmt system, but instead leverage the existing identity store to manage those critical accounts.

http://antoanthongtin.vn/Portals/0/UploadImages/kiennt2/KyYeu/DuLieuTrongNuoc/Dulieu/KyYeu/04.Cyber-Ark%20Presentation%20-%20NISD%20Vietnam%202012.ppt%20%5BCompatibility%20Mode%5D.pdf

The PSM or PV(Web)mgr should be the main proxy to all the backend appl server as they are the authorised entity to authenticate and govern the administrative activities performed using that privileged account login.

It is good to know using the product where do they stand in guidance referencing the widely recognised NIST SP800-53 (note this is older version but should be alright as research on robustness). Below is an Assessment of CyberArk's most common deployed solutions
http://ww1.prweb.com/prfiles/2012/05/22/9533253/Cyber-Ark_NIST.pdf

There is also the release note highlighting key component and installation/upgrade steps, not too much what you can get but give you general coverage of the key component and enhancements

http://www.eb-qual.ch/fr/assets/Document-s-events/Doc-events-news/PIM%20V8%200%20Release%20Notes.pdf

May be better to please contact your local CyberArk technical account manager to get those info
0
 
LVL 4

Author Comment

by:Rahul Patil
ID: 39889882
Hi Breadtan,

Thanks for above links but they contain only introductory info about product and what it does.I am looking for some guidelines for below

1) Steps implementing cyber ark PIM?
2)Guideline like basic requirement and step by step guide for installation
3)Common issues and troubleshooting

If anyone can provide any links that would be really helpful.

Regards,
Rtantra
0
 
LVL 61

Expert Comment

by:btan
ID: 39890679
Thise documentation is not avialble in public and minimal. Suggest going direct with their sales contact as it will be much faster. They may render more help
http://www.cyberark.com/contact
0
 
LVL 61

Expert Comment

by:btan
ID: 39890680
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Read about achieving the basic levels of HRIS security in the workplace.
OfficeMate Freezes on login or does not load after login credentials are input.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now