?
Solved

Cyber Ark Implementation/Deployment

Posted on 2014-02-25
4
Medium Priority
?
12,434 Views
Last Modified: 2014-03-12
Hi ,

I am new to cyber Ark.We need to deploy cyber-ark privilege identity/account management and on board existing active directory accounts on it.I tried to  search on internet but not found any product guide or deployment guide except few introductory docs.Can you please help?

Any links to admin/deployment guide or training would be great..

Regards,
Rtantra
0
Comment
Question by:Rahul Patil
  • 3
4 Comments
 
LVL 66

Accepted Solution

by:
btan earned 1000 total points
ID: 39888474
Likely you are exploring the below product offering

Privileged Identity Management (PIM) Suite – comprehensive lifecycle management for
privileged, shared and application accounts across the datacenter.

Privileged Session Management (PSM) Suite–isolates, controls and monitors privileged sessions on servers, databases or virtual environments, providing a pre-integrated solution with PIM.

Sensitive Information Management (SIM) Suite–manages and protects sensitive information whether being shared within the organization or sent to external parties

You may want to check out the below

A) The slides for the product suite depicting PIM and PSM, there is some logical diagram (slide 22) and screenshot of the actual mgmt console (alerts etc) but in term of deployment guide it is not published though.

Primarily, PIM is the overarching consisting the overall password vault (PVWebAccess-PVWA), application identity mgr (AIM) and the on-demand privileged mgr (OPM). it lay the foundation and PSM further give granular mgmt control over the identified privileged users such as your sysadmin to the various appl servers. Note it cannot replaced the enterprise identity mgmt system, but instead leverage the existing identity store to manage those critical accounts.

http://antoanthongtin.vn/Portals/0/UploadImages/kiennt2/KyYeu/DuLieuTrongNuoc/Dulieu/KyYeu/04.Cyber-Ark%20Presentation%20-%20NISD%20Vietnam%202012.ppt%20%5BCompatibility%20Mode%5D.pdf

The PSM or PV(Web)mgr should be the main proxy to all the backend appl server as they are the authorised entity to authenticate and govern the administrative activities performed using that privileged account login.

It is good to know using the product where do they stand in guidance referencing the widely recognised NIST SP800-53 (note this is older version but should be alright as research on robustness). Below is an Assessment of CyberArk's most common deployed solutions
http://ww1.prweb.com/prfiles/2012/05/22/9533253/Cyber-Ark_NIST.pdf

There is also the release note highlighting key component and installation/upgrade steps, not too much what you can get but give you general coverage of the key component and enhancements

http://www.eb-qual.ch/fr/assets/Document-s-events/Doc-events-news/PIM%20V8%200%20Release%20Notes.pdf

May be better to please contact your local CyberArk technical account manager to get those info
0
 
LVL 4

Author Comment

by:Rahul Patil
ID: 39889882
Hi Breadtan,

Thanks for above links but they contain only introductory info about product and what it does.I am looking for some guidelines for below

1) Steps implementing cyber ark PIM?
2)Guideline like basic requirement and step by step guide for installation
3)Common issues and troubleshooting

If anyone can provide any links that would be really helpful.

Regards,
Rtantra
0
 
LVL 66

Expert Comment

by:btan
ID: 39890679
Thise documentation is not avialble in public and minimal. Suggest going direct with their sales contact as it will be much faster. They may render more help
http://www.cyberark.com/contact
0
 
LVL 66

Expert Comment

by:btan
ID: 39890680
0

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
How can you see what you are working on when you want to see it while you to save a copy? Add a "Save As" icon to the Quick Access Toolbar, or QAT. That way, when you save a copy of a query, form, report, or other object you are modifying, you…
Suggested Courses

612 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question