下载PDF
CyberArk > 实例探究 > Rockwell Automation Deploys CyberArk for Proactive Privileged Access Management, Provisioning, and Control
CyberArk Logo

Rockwell Automation Deploys CyberArk for Proactive Privileged Access Management, Provisioning, and Control

技术
  • 网络安全和隐私 - 身份认证管理
  • 网络安全和隐私 - 安全合规
适用行业
  • Software
适用功能
  • 商业运营
  • 质量保证
服务
  • 系统集成
  • 网络安全服务
  • 培训
挑战
One of Rockwell Automation’s most important IT priorities was to proactively identify the privileged access risk while ensuring that all accounts complied with regular but flexible password policies. With multiple employees, servers, privileged accounts and password policies established across their platforms, standardization and control would be imperative to ensuring that Rockwell identified and mitigated the risks associated with unmanaged privileged accounts. The company sought a solution to enforce and automate role-based privileged access control and policies in order to secure accounts, mitigate password vulnerabilities and support audit and compliance requirements such as those defined within Cobit’s DS5.4 User Account Management. Moreover, reflective of Rockwell’s process-oriented business, the company required detailed access to metrics that demonstrated the extent of privilege access vulnerabilities, including any risks associated with unmanaged accounts and administrative rights.
关于客户
Rockwell Automation is an innovative global industrial automation provider headquartered in Milwaukee, WI. The company delivers business process control and information platforms, software applications, and automation components to customers around the globe. With an annual revenue of $6.66 billion USD in 2018 and a workforce of 23,000 employees, Rockwell Automation is a significant player in the industrial automation sector. The company operates across diverse computing environments and servers, necessitating robust solutions for managing privileged access. Rockwell Automation is committed to product excellence and innovation, seeking agile solutions that can be managed across multiple teams without sacrificing productivity or the quality of their work.
解决方案
For Rockwell Automation, the only solution considered was the CyberArk Privileged Access Manager Solution. After analyzing the product, Rockwell immediately recognized that the CyberArk solution enables a proactive and automated approach to privileged access management—ensuring security best practices across multiple IT teams and both Windows and Unix environments. Moreover, further supporting best practices and business continuity, Rockwell was able to integrate the CyberArk solution with existing security tools, including vulnerability management for deeper, authenticated scans and collection of privileged activity within their Security Information and Event Management (SIEM). In just two months, thanks in part to CyberArk’s technical resources, the company was able to fully implement the solution. With solid role definitions integrated with SailPoint’s IIQ suite, Rockwell was able to reduce operational costs by improving the onboarding process and streamlining privileged access through CyberArk’s Privileged Access Manager Solution. “CyberArk has delivered excellent product features, which are streamlined to scale throughout the organization,” commented Jayne Little, Information Security Engineer (Privileged Access) at Rockwell Automation. “CyberArk’s solutions have proved much faster to deploy than other security tools, giving us good quality insight within a short time period.”
运营影响
  • Standardization and automated password management for reduced risk around privileged accounts.
  • Enforcement of role-based privileged access control while creating smoother work processes.
  • Proactive management of privileged access, accounts, and activity—enabling audit and compliance.
数量效益
  • Rockwell Automation reduced operational costs by improving the onboarding process.
  • The company was able to fully implement the solution in just two months.
  • CyberArk’s solutions have proved much faster to deploy than other security tools.

相关案例.

联系我们

欢迎与我们交流!

* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

Thank you for your message!
We will contact you soon.