sb-eu logo
Story image

CyberArk brings machine identity to Red Hat OpenShift with Conjur Enterprise

Privileged access security vendor CyberArk has announced that its open source machine identity platform - CyberArk Conjur Enterprise - is now available for Red Hat’s OpenShift Container Platform.

The company says that my running on the OpenShift platform, Conjur Enterprise can help simplify DevOps secrets management, enabling organisations to manage and rotate secrets and other credentials. Red Hat OpenShift Partner Ecosystem global technology director Chris Morgan says, “Container platforms can offer significant business advantages, and it is important for organisations to think about an approach to security that aligns with the agility and velocity that today’s developers want.

“With CyberArk Conjur Enterprise running on Red Hat OpenShift Container Platform, users have more choice for an enterprise-class, scalable secrets management solution that can meet these needs.”

According to CyberArk, the new integration will help customers eliminate siloed secrets while enabling developers and operations teams to more easily and securely deploy applications at scale.

It says customers will benefit from a ‘security first’ approach that is designed to deliver an automated, single point of control for secrets and credential management across the cloud and on-premises environments that Red Hat OpenShift Container Platform supports.

By implementing consistent secrets management and privileged access security policies across OpenShift containers, CyberArk and Red Hat are aiming to simplify the protection of secrets – especially those that are often not well managed in fast-moving DevOps environments, such as SSH/API keys, passwords and certificates.

CyberArk Conjur Enterprise and Red Hat OpenShift Container Platform can also be integrated with the CyberArk Enterprise Password Vault, serving to provide additional value by automatically replicating secrets from the CyberArk Enterprise Password Vault to CyberArk Conjur Enterprise. “Securing CI/CD environments and container application platforms can increase enterprise workflow and policy management complexities,”

Adam Bosnian, CyberArk global business development executive vice president says the integrated solution will provide a simplified process for customers.

“CyberArk Conjur Enterprise on Red Hat OpenShift Container Platform can offer organisations a solution to simplify the process—enabling them to capitalise on accelerated DevOps processes with the flexibility to deploy in their preferred compute environment, without introducing unnecessary secrets-related risk,” Bosnian says.

CyberArk and Red Hat announced the new integration at Red Hat Summit in San Francisco.

Story image
Bring Your Own PC security to transform businesses within five years - Gartner
“Prior to the COVID-19 pandemic, there was little interest in BYOPC."More
Story image
Strong cybersecurity posture crucial for company success - Fortinet
"They should also conduct due diligence to ensure partners aren’t inadvertently creating vulnerabilities with insufficient cybersecurity measures."More
Story image
Proofpoint and CyberArk extend partnership to further safeguard high-risk users
“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats."More
Story image
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
Research: 61% of companies have suffered an insider attack in last 12 months
It comes as rapid migration to cloud and remote working and BYOD scenarios leave organisations increasingly vulnerable to insider attacks as a result of the upheaval caused by the COVID-19 pandemic.More