CyberArk Software Ltd.
Just-in-time and secure activation of software
Last updated:
Abstract:
Disclosed embodiments relate to systems and methods for securely and efficiently enabling activation of access-limited software to permitted identities. Techniques include receiving, from a personal computing device associated with an identity, a software identifier associated with access-limited software available on an endpoint computing resource; identifying a tenant identifier associated with the identity; identifying a prompt to activate the access-limited software available on the endpoint computing resource; determining that the identity is permitted to utilize the access-limited software based on at least the software identifier and tenant identifier; and enabling, based on the determining, activation of the access-limited software for use by the identity at the endpoint computing resource.
Utility
29 Aug 2019
3 Mar 2020