Download PDF
Rockwell Automation Deploys CyberArk for Proactive Privileged Access Management, Provisioning, and Control
Technology Category
- Cybersecurity & Privacy - Identity & Authentication Management
- Cybersecurity & Privacy - Security Compliance
Applicable Industries
- Software
Applicable Functions
- Business Operation
- Quality Assurance
Services
- System Integration
- Cybersecurity Services
- Training
The Challenge
One of Rockwell Automation’s most important IT priorities was to proactively identify the privileged access risk while ensuring that all accounts complied with regular but flexible password policies. With multiple employees, servers, privileged accounts and password policies established across their platforms, standardization and control would be imperative to ensuring that Rockwell identified and mitigated the risks associated with unmanaged privileged accounts. The company sought a solution to enforce and automate role-based privileged access control and policies in order to secure accounts, mitigate password vulnerabilities and support audit and compliance requirements such as those defined within Cobit’s DS5.4 User Account Management. Moreover, reflective of Rockwell’s process-oriented business, the company required detailed access to metrics that demonstrated the extent of privilege access vulnerabilities, including any risks associated with unmanaged accounts and administrative rights.
About The Customer
Rockwell Automation is an innovative global industrial automation provider headquartered in Milwaukee, WI. The company delivers business process control and information platforms, software applications, and automation components to customers around the globe. With an annual revenue of $6.66 billion USD in 2018 and a workforce of 23,000 employees, Rockwell Automation is a significant player in the industrial automation sector. The company operates across diverse computing environments and servers, necessitating robust solutions for managing privileged access. Rockwell Automation is committed to product excellence and innovation, seeking agile solutions that can be managed across multiple teams without sacrificing productivity or the quality of their work.
The Solution
For Rockwell Automation, the only solution considered was the CyberArk Privileged Access Manager Solution. After analyzing the product, Rockwell immediately recognized that the CyberArk solution enables a proactive and automated approach to privileged access management—ensuring security best practices across multiple IT teams and both Windows and Unix environments. Moreover, further supporting best practices and business continuity, Rockwell was able to integrate the CyberArk solution with existing security tools, including vulnerability management for deeper, authenticated scans and collection of privileged activity within their Security Information and Event Management (SIEM). In just two months, thanks in part to CyberArk’s technical resources, the company was able to fully implement the solution. With solid role definitions integrated with SailPoint’s IIQ suite, Rockwell was able to reduce operational costs by improving the onboarding process and streamlining privileged access through CyberArk’s Privileged Access Manager Solution. “CyberArk has delivered excellent product features, which are streamlined to scale throughout the organization,” commented Jayne Little, Information Security Engineer (Privileged Access) at Rockwell Automation. “CyberArk’s solutions have proved much faster to deploy than other security tools, giving us good quality insight within a short time period.”
Operational Impact
Quantitative Benefit
Related Case Studies.
Case Study
Factor-y S.r.l. – Establishes a cost-effective, security-rich development environment with SoftLayer technology
Factor-y S.r.l., a web portal developer, was faced with the challenge of migrating its development infrastructure to a reliable cloud services provider with highly responsive technical support. The company needed a solution that would not only provide a secure and reliable environment but also support its expansion by providing resources to create and deliver innovative offerings.
Case Study
Darwin Ecosystem: Accelerating discovery and insight through cutting-edge big data and cognitive technologies
Darwin Ecosystem was founded with a unique vision of harnessing chaos theory mathematics to uncover previously hidden connections in unstructured data. The company’s algorithms can look at all the data generated by any source (such as news, RSS feeds and Twitter), and analyze how a specific set of concepts within that data are evolving over time. This is particularly valuable in situations such as business and competitive intelligence, social research, brand monitoring, legal discovery, risk mitigation and even law enforcement. A common problem in these areas is that a regular web search will only turn up the all-time most popular answers to a given question – but what the expert researcher is actually interested in is the moment-tomoment evolution of the data available on that topic. Darwin’s algorithm is computationally intensive, and the sources of data it correlates can be vast. To bring its benefits to a larger commercial audience, Darwin needed to find a way to make it scale.
Case Study
Zend accelerates, simplifies PHP development
Zend Technologies, a major contributor to the PHP open source community, needed to keep pace with emerging trends such as mobility, agile development, application lifecycle management and continuous delivery. The company needed to provide the right tools to the worldwide community of PHP developers. The challenge was to support enterprise-class capabilities from end to end, including mobile, compliance and security. The pace of business required developers to show results fast across a variety of devices without compromising quality or security.
Case Study
Delivering modern data protection with cloud scale backup from Cobalt Iron and IBM
Organizations are struggling to modernize their legacy data protection environments in the face of growing demands around new infrastructure, new applications, and budget consolidation. Virtualization and modern application development processes have significantly outgrown legacy backup architectures. In response, infrastructure teams have created multiple backup solution types to handle the varying SLAs (performance, scale, cost) required by their business sponsors. However, the sheer number and variety of solutions in this uncontrolled expansion creates huge amounts of work, threatening to overwhelm the IT team in many organizations. Today, developers may add new applications and virtual server instances by the hundreds per day without accounting for the restrictions of the existing backup infrastructure. They leverage the cloud for immediate compute and storage resources, yet rarely communicate succinctly with corporate IT to ensure that the appropriate data protection services are in place.
Case Study
Achieving near limitless scalability and flexibility with data in the cloud
Web-based publishing platform SpaceCraft found that as its client base grew, it was spending an increasing amount of time managing its databases, distracting its focus from product innovation. As its user base rapidly expanded, data volumes at SpaceCraft began to rise dramatically. Along with their main focus on maintaining and further developing a great platform for web publishing, the SpaceCraft team had the added pressure of managing the increasing quantities of data while ensuring ongoing high performance for clients.
Case Study
nViso SA – Delivers emotion recognition solutions worldwide with a scalable SoftLayer hosting solution
nViso SA, a company that provides emotion recognition solutions, was in need of a high-performance cloud hosting infrastructure. The company wanted to extend its services to a global customer base. The challenge was to find a solution that could handle the demands of their growing customer base and the need for high performance and reliability.