CyberArk Software Ltd.
Automatically detecting a violation in a privileged access session

Last updated:

Abstract:

Disclosed embodiments include securing privileged access communication with target systems. Techniques include identifying a request for access to a target resource by an identity, the request being associated with a requested activity that requires privileged access, identifying a connection session in which the identity communicates with the target resource, automatically analyzing an actual activity of the identity occurring in the connection session, automatically comparing the actual activity to the requested activity to determine whether the actual activity complies with the requested activity, and automatically detecting, based on the determination, an inconsistency between the actual activity of the identity and the requested activity associated with the request for access.

Status:
Grant
Type:

Utility

Filling date:

18 Jan 2018

Issue date:

24 Nov 2020