CyberArk Software Ltd.
Automatically detecting a violation in a privileged access session
Last updated:
Abstract:
Disclosed embodiments include securing privileged access communication with target systems. Techniques include identifying a request for access to a target resource by an identity, the request being associated with a requested activity that requires privileged access, identifying a connection session in which the identity communicates with the target resource, automatically analyzing an actual activity of the identity occurring in the connection session, automatically comparing the actual activity to the requested activity to determine whether the actual activity complies with the requested activity, and automatically detecting, based on the determination, an inconsistency between the actual activity of the identity and the requested activity associated with the request for access.
Utility
18 Jan 2018
24 Nov 2020