Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Cyber Ark Implementation/Deployment

Posted on 2014-02-25
4
Medium Priority
?
11,651 Views
Last Modified: 2014-03-12
Hi ,

I am new to cyber Ark.We need to deploy cyber-ark privilege identity/account management and on board existing active directory accounts on it.I tried to  search on internet but not found any product guide or deployment guide except few introductory docs.Can you please help?

Any links to admin/deployment guide or training would be great..

Regards,
Rtantra
0
Comment
Question by:Rahul Patil
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 65

Accepted Solution

by:
btan earned 1000 total points
ID: 39888474
Likely you are exploring the below product offering

Privileged Identity Management (PIM) Suite – comprehensive lifecycle management for
privileged, shared and application accounts across the datacenter.

Privileged Session Management (PSM) Suite–isolates, controls and monitors privileged sessions on servers, databases or virtual environments, providing a pre-integrated solution with PIM.

Sensitive Information Management (SIM) Suite–manages and protects sensitive information whether being shared within the organization or sent to external parties

You may want to check out the below

A) The slides for the product suite depicting PIM and PSM, there is some logical diagram (slide 22) and screenshot of the actual mgmt console (alerts etc) but in term of deployment guide it is not published though.

Primarily, PIM is the overarching consisting the overall password vault (PVWebAccess-PVWA), application identity mgr (AIM) and the on-demand privileged mgr (OPM). it lay the foundation and PSM further give granular mgmt control over the identified privileged users such as your sysadmin to the various appl servers. Note it cannot replaced the enterprise identity mgmt system, but instead leverage the existing identity store to manage those critical accounts.

http://antoanthongtin.vn/Portals/0/UploadImages/kiennt2/KyYeu/DuLieuTrongNuoc/Dulieu/KyYeu/04.Cyber-Ark%20Presentation%20-%20NISD%20Vietnam%202012.ppt%20%5BCompatibility%20Mode%5D.pdf

The PSM or PV(Web)mgr should be the main proxy to all the backend appl server as they are the authorised entity to authenticate and govern the administrative activities performed using that privileged account login.

It is good to know using the product where do they stand in guidance referencing the widely recognised NIST SP800-53 (note this is older version but should be alright as research on robustness). Below is an Assessment of CyberArk's most common deployed solutions
http://ww1.prweb.com/prfiles/2012/05/22/9533253/Cyber-Ark_NIST.pdf

There is also the release note highlighting key component and installation/upgrade steps, not too much what you can get but give you general coverage of the key component and enhancements

http://www.eb-qual.ch/fr/assets/Document-s-events/Doc-events-news/PIM%20V8%200%20Release%20Notes.pdf

May be better to please contact your local CyberArk technical account manager to get those info
0
 
LVL 4

Author Comment

by:Rahul Patil
ID: 39889882
Hi Breadtan,

Thanks for above links but they contain only introductory info about product and what it does.I am looking for some guidelines for below

1) Steps implementing cyber ark PIM?
2)Guideline like basic requirement and step by step guide for installation
3)Common issues and troubleshooting

If anyone can provide any links that would be really helpful.

Regards,
Rtantra
0
 
LVL 65

Expert Comment

by:btan
ID: 39890679
Thise documentation is not avialble in public and minimal. Suggest going direct with their sales contact as it will be much faster. They may render more help
http://www.cyberark.com/contact
0
 
LVL 65

Expert Comment

by:btan
ID: 39890680
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…
Loops Section Overview

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question