CyberArk Adds the Privileged Access Security Solution v10.4 to the DoDIN APL

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

It’s been nearly a decade since the Department of Defense (DoD) created the Department of Defense Information Network Approved Products List (DoDIN APL) to highlight tried and tested solutions that specifically address government security concerns. The APL was developed in an effort to maintain a single consolidated list of products that meet the demands of the nation and our growing need to protect and secure sensitive data and networks. Completing the certification process is an indication to agencies and government end users that all listed products have undergone rigorous DoD testing regulations; passing stringent information assurance (IA), interoperability (IO), Common Access Card (CAC)/Public Key Infrastructure (PKI), and IPv6 requirements.

U.S. government procurement for products that are on the DoD network is limited to only those solutions that have completed this strenuous testing process. The DoDIN APL now serves as the agency’s master list of readily available solutions that are approved to operate within the defense technology infrastructure.

We are happy to announce that the CyberArk Privileged Access Security Solution v10.4 has completed testing and was certified effective October 4, 2018 as a Cybersecurity Tools (CST) device type (Tracking Number (TN) 1712401).

We previously received both APL and Common Criteria (CC) designations for v9.1 of the CyberArk solution in early 2016 and are currently certifying v10.4 for CC under a National Information Assurance Partnership (NIAP) protection profile.

CyberArk’s Commitment to the Federal Government Agencies

The CyberArk Privileged Access Security Solution has been independently validated and awarded an Evaluation Assurance Level (EAL) 2+ under the Common Criteria Recognition Agreement (CCRA). We’ve received the U.S. Army Certificate of Networthiness (CoN) enabling the streamlined implementation of the CyberArk solution on the Army Enterprise Architecture/LandWarNet (LWN). You can visit the Army CoN website for more details on the CyberArk certification #201621511 (requires CAC for access). Prioritizing both obtaining and maintaining these certifications demonstrates CyberArk’s continued commitment to helping federal government agencies proactively protect privileged users and credentials across networks.

Here are a few ways in which CyberArk can help meet security and compliance requirements in federal government agencies:

  • FISMA/NIST SP800-53 – CyberArk solutions help federal government agencies comply with requirements related to the “Access Control,” “Audit and Accountability” and “Identification and Authentication” control families.
  • Department of Homeland Security CDM Program – Phase 2 of the Continuous Diagnostics and Mitigation (CDM) program features least privilege and infrastructure integrity requirements which can be addressed with CyberArk solutions.
  • NERC – CIP – Requirements related to privileged access control, remote access management and access revocation in the regulation can be addressed with CyberArk solutions.
  • HSPD-12 – The requirement to authenticate using a Personal Identity Verification (PIV) card can be easily implemented across all current and legacy systems with the seamless integration of CyberArk solutions and PIV cards.

You want Federal White Papers? We’ve got Federal White Papers:

To learn more, visit https://www.cyberark.com/solutions/federal-government-solutions/.

The post CyberArk Adds the Privileged Access Security Solution v10.4 to the DoDIN APL appeared first on CyberArk.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
991 Followers
About CyberArk
CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies – including more than 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Promoted Content
7 COMMON PRACTICES THAT MAKE YOUR ENTERPRISE VULNERABLE TO A CYBER ATTACK
Advanced cyber attacks involve compromised privileged accounts. Cyber attackers target them because they represent the keys to the IT kingdom. Effective enterprise security includes proactively protecting privileged accounts. Industry experts have identified practices that increase an organization’s vulnerability to a cyber attack. How many of these are common at your organization?

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

i2p Networks, Tor and Freenet Features: Pros + Cons
Views: 77 / January 23, 2019
DNS Rebinding – Behind The Enemy Lines
Views: 2437 / January 19, 2019
My IT Learning Journey
Views: 2844 / January 18, 2019
A New Age of Digital Interconnection
Views: 2267 / January 18, 2019
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel