Intelligent CIO APAC Issue 51 | Page 74

INDUSTRY WATCH emails will still get through , and there ’ s a high chance when an email arrives to the inbox , employees would make a mistake . CyberArk provides a great multilayered solution that defuses the attack and ensures identity security to help us protect vulnerable staff across our nation-wide business . CyberArk also supports the multiple platforms that exist in our IT environment , and it has great management features , enabling operational efficiencies .”
Heng Leong Hang has implemented multiple capabilities of the CyberArk Identity Security Platform comprising CyberArk Privileged Access Manager Self-Hosted ( PAM ), CyberArk Endpoint Privilege Manager ( EPM ) and CyberArk Adaptive Multifactor Authentication ( MFA ). The platform is used by the company ’ s entire workforce , including developers , extended IT and third-party vendors . The CyberArk Adaptive MFA solution alone safeguards the access of multiple privileged account staff , almost a thousand workstation endpoints and hundreds of users across the workforce .
CyberArk has also been used to remove excessive local admin rights , enforce role-specific least privilege and limit uncontrolled user access to applications . Core business systems and database servers are now monitored and secured , actions and events are logged and privileged access by the IT department managed effectively . Heng Leong Hang also uses CyberArk to support compliance requirements and objectives . The solution automatically logs activities such as when employees request and use privileged access . The company uses this to provide a historical record of actions and incidents which is needed for auditing and compliance . CyberArk has further improved endpoint security because it stops users from downloading and installing unauthorized software onto their local devices .
But now CyberArk takes our security to another level . It protects our endpoints and personal computers joining our domain , it improves legislative compliance , and it supports mixed cloud environments – all while improving staff productivity . Of all the security products we have at Heng Leong Hang , CyberArk is the most crucial and the one that has the most immediate impact .”
As part of its security strategy and requirement to meet specific privileged access regulations , Heng Leong Hang has implemented several standards such as ISO 27001 and ISO 27701 .
“ The compliance capabilities of the CyberArk Identity Security Platform are great and CyberArk is continuously evolving its regulatory features ,” said Lu .
“ CyberArk ’ s solutions are designed with a securityfirst mindset and unified within an identity security platform that provides defense-in-depth protection , secures workstations and servers , implements least privilege and integrates very well with on-premises and cloud environments – all of which was critical for us . It combines single sign-on , MFA , browser security , application and privilege control and it includes record of activity , so it is really thorough and comprehensive .”
Edward Hsieh , Regional Director of CyberArk in North Asia , said : “ We are delighted to have the opportunity to assist Heng Leong Hang in successfully strengthening its overall cybersecurity architecture , thereby protecting its employees , customers and business operations . This not only enhances the trust of their employees and customers , but also provides the necessary security foundation for Heng Leong Hang in an increasingly digitalized cloud-based business environment .” p
Heng Leong Hang is planning to expand its use of CyberArk MFA and include CyberArk Single Sign-On ( SSO ) to achieve password-less access . “ CyberArk MFA combined with CyberArk SSO will allow us to enable passwordless access for our workforce . By eliminating the need to remember and enter passwords , we ’ ll improve the user experience , reduced the risk of credential theft and simplified the management of identity and access .” said Lu .
“ CyberArk has exceeded my expectations by significantly reducing the cyber risks associated with identity theft . Originally , I wanted to improve and secure password management and control .
74 INTELLIGENTCIO APAC www . intelligentcio . com