DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

CyberArk Launches Identity-Centric Secure Browser

DigitalCIO Bureau by DigitalCIO Bureau
March 29, 2024
in Tech News
0
CyberArk Launches Identity-Centric Secure Browser
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

CyberArk has announced the general availability of CyberArk Secure Browser, the industry’s first identity-centric secure browser, providing enhanced security and privacy alongside a familiar, productive user experience.

Backed by intelligent privilege controls and simple to deploy across devices, CyberArk Secure Browser is purpose-built for a cloud-first world, providing secure, consistent access to both on-premises resources and SaaS applications. It allows unprecedented visibility, control and governance for security teams, helping to prevent the malicious use of compromised identities, endpoints and credentials both at and beyond login. Secure Browser is a component of the CyberArk Identity Security Platform, enabling secure access for any identity — human or machine — to any resource or environment from anywhere, using any device.

“Increased usage of remote access, SaaS applications and cloud infrastructure created a security blind spot for us, prompting a rethink of our security posture and investment in tools to secure unauthorized access to critical assets via our distributed workforce,” said Chris Dove, Enterprise Architect, California Department of Finance. “Adding CyberArk Secure Browser to our existing CyberArk deployment will allow us to strictly enforce security policies without sacrificing productivity. We will be better able to safeguard our data, making sure employees can only access work systems through a secure, isolated browser that rotates passwords and keeps them from being saved – and potentially stolen.”

A March 2024 study of US office workers further highlights the browser-based cybersecurity risk exposure faced by organizations:

  • 78% use the same device to access company-confidential and sensitive information as they do for personal browsing
  • 65% said that they need to violate organizational safe browsing policies to perform their role (12% “always” violated policies).
  • 59% save workplace logins and passwords in the web browser used to perform their job.

 

Available to customers of the CyberArk Identity Security Platform, CyberArk Secure Browser safeguards the organization’s most valuable resources, enabling a secure passwordless experience, easy access to privileged information and assets and helping to prevent breaches resulting from cookie theft and session takeover attacks. Recent major security breaches and new research from CyberArk Labs demonstrates how easy it is for techniques like cookie theft to give threat actors unauthorized access to sensitive data and assets, completely bypassing authentication tools. Secure Browser can ensure that there are no cookies to steal.

CyberArk Secure Browser Addresses Key Enterprise Cybersecurity Challenges

  • Secures all access – including privileged and sensitive access – from the browser
  • Fully integrates with the organization’s entire Identity and Access Management and security architecture
  • Provides a secure and safe way for users to access corporate resources from their own or unmanaged devices
  • Separates work and personal applications and domains
  • Enables easy, quick resource access for all user types, including high-risk groups
  • Streamlines ability to meet regulatory and audit requirements

  “The proliferation of SaaS apps, cloud-native resources and business-critical applications that are accessed from the browser introduce new and significant risks that attackers have been quick to take advantage of,” said Matt Cohen, CEO, CyberArk. “Traditional access management approaches lack the right controls at the edge to be able to see and secure the complete identity journey, end-to-end. We are excited to deliver an enhanced enterprise browser that boosts productivity and layers on additional security and privacy controls to the most frequently used application in most organizations. This is just another example of how CyberArk is extending identity security to all users no matter how they access sensitive data and assets.”

Tags: CyberArk
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

NTT: Clear AI strategy leads to better financial results

by DigitalCIO Bureau
December 12, 2025
0
OurCrowd AI Fund to Collaborate with NVIDIA Inception

Organizations with a clear AI strategy achieve better financial results. Only fifteen percent of the companies surveyed fall into the "AI leader" category, characterized by a structured approach...

Read moreDetails

TCS Buys US Salesforce Consulting Firm Coastal Cloud

by DigitalCIO Bureau
December 11, 2025
0
Central Bank in US Selects TCS to Modernize its Core Technology

Tata Consultancy Services (TCS) has signed a definitive agreement to acquire 100% stake in Coastal Cloud, a leading Salesforce Summit partner that specializes in Salesforce Consulting for an all cash...

Read moreDetails

Vertiv completes acquisition of Purge Rite Intermediate

by DigitalCIO Bureau
December 11, 2025
0
Vertiv extends Liebert ITA2 UPS Range, providing flexible Edge and Smart IT power backup in India

Vertiv has completed the acquisition of Purge Rite Intermediate. Purge Rite provides mechanical flushing, purging, and filtration services for data centers and other critical facilities. The transaction, valued...

Read moreDetails

Kiteworks’ New Survey Reveals Critical Need to Shift From Legacy Web Forms

by DigitalCIO Bureau
December 8, 2025
0
Kiteworks’ New Survey Reveals Critical Need to Shift From Legacy Web Forms

Kiteworks has released its comprehensive 2025 Data Security and Compliance Risk: Data Forms Survey Report. The research of 324 cybersecurity, risk, IT, and compliance professionals exposes a stark...

Read moreDetails

Red Hat AI now runs on AWS Trainium and Inferentia chips

by DigitalCIO Bureau
December 5, 2025
0
Red Hat AI now runs on AWS Trainium and Inferentia chips

Red Hat has announced an expanded collaboration with Amazon Web Services (AWS) to power enterprise-grade generative AI (gen AI) on AWS with Red Hat AI and AWS AI...

Read moreDetails
Next Post
OurCrowd AI Fund to Collaborate with NVIDIA Inception

Intel Announces Two AI Initiatives

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

AI Could Soon Bypass Most Known Cybersecurity Measures

RSA Announces New Cybersecurity Innovations

May 6, 2025

Ericsson flags security risks as telcos seek clarity on Huawei

September 13, 2019
Software Engineering Leader Roles to Require Oversight of Generative AI by 2025

Microsoft’s GenAI Capabilities Continue To Impress

November 23, 2023

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope New Relic NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?