CyberArk Software Ltd.
Monitoring and controlling risk compliance in network environments
Last updated:
Abstract:
Techniques include analyzing risk data for a plurality of network-based identities and generating interactive graphical user interfaces to allow for visualization of the risk data. Operations may include identifying a plurality of network-based identities that have been deployed in a network environment; identifying a scope of permissions associated with the plurality of network-based identities; determining a scope of activity of at least one of: use of the permissions, non-use of the permissions, or activity associated with the permissions for the plurality of network-based identities; developing risk statuses for the plurality of network-based identities; and generating a graphical user interface representing the risk statuses, the graphical user interface comprising a first graphical element having a size and a color, the size and the color being determined based on the risk statuses associated with a first platform within the network environment.
Utility
7 Oct 2019
25 Aug 2020