Solved

Cyber Ark Implementation/Deployment

Posted on 2014-02-25
4
9,494 Views
Last Modified: 2014-03-12
Hi ,

I am new to cyber Ark.We need to deploy cyber-ark privilege identity/account management and on board existing active directory accounts on it.I tried to  search on internet but not found any product guide or deployment guide except few introductory docs.Can you please help?

Any links to admin/deployment guide or training would be great..

Regards,
Rtantra
0
Comment
Question by:Rahul Patil
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 39888474
Likely you are exploring the below product offering

Privileged Identity Management (PIM) Suite – comprehensive lifecycle management for
privileged, shared and application accounts across the datacenter.

Privileged Session Management (PSM) Suite–isolates, controls and monitors privileged sessions on servers, databases or virtual environments, providing a pre-integrated solution with PIM.

Sensitive Information Management (SIM) Suite–manages and protects sensitive information whether being shared within the organization or sent to external parties

You may want to check out the below

A) The slides for the product suite depicting PIM and PSM, there is some logical diagram (slide 22) and screenshot of the actual mgmt console (alerts etc) but in term of deployment guide it is not published though.

Primarily, PIM is the overarching consisting the overall password vault (PVWebAccess-PVWA), application identity mgr (AIM) and the on-demand privileged mgr (OPM). it lay the foundation and PSM further give granular mgmt control over the identified privileged users such as your sysadmin to the various appl servers. Note it cannot replaced the enterprise identity mgmt system, but instead leverage the existing identity store to manage those critical accounts.

http://antoanthongtin.vn/Portals/0/UploadImages/kiennt2/KyYeu/DuLieuTrongNuoc/Dulieu/KyYeu/04.Cyber-Ark%20Presentation%20-%20NISD%20Vietnam%202012.ppt%20%5BCompatibility%20Mode%5D.pdf

The PSM or PV(Web)mgr should be the main proxy to all the backend appl server as they are the authorised entity to authenticate and govern the administrative activities performed using that privileged account login.

It is good to know using the product where do they stand in guidance referencing the widely recognised NIST SP800-53 (note this is older version but should be alright as research on robustness). Below is an Assessment of CyberArk's most common deployed solutions
http://ww1.prweb.com/prfiles/2012/05/22/9533253/Cyber-Ark_NIST.pdf

There is also the release note highlighting key component and installation/upgrade steps, not too much what you can get but give you general coverage of the key component and enhancements

http://www.eb-qual.ch/fr/assets/Document-s-events/Doc-events-news/PIM%20V8%200%20Release%20Notes.pdf

May be better to please contact your local CyberArk technical account manager to get those info
0
 
LVL 4

Author Comment

by:Rahul Patil
ID: 39889882
Hi Breadtan,

Thanks for above links but they contain only introductory info about product and what it does.I am looking for some guidelines for below

1) Steps implementing cyber ark PIM?
2)Guideline like basic requirement and step by step guide for installation
3)Common issues and troubleshooting

If anyone can provide any links that would be really helpful.

Regards,
Rtantra
0
 
LVL 63

Expert Comment

by:btan
ID: 39890679
Thise documentation is not avialble in public and minimal. Suggest going direct with their sales contact as it will be much faster. They may render more help
http://www.cyberark.com/contact
0
 
LVL 63

Expert Comment

by:btan
ID: 39890680
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question