About Us

Citrus Consulting Services is the Consulting and the Transformation Services arm of Redington Gulf.

Sunday – Thursday: 9:00AM–6:00PM (Sales), Sunday – Saturday: 24×7 / 365 (Support) E.O#3, Ground Floor, Building 01 Dubai Internet City, P.O Box 501 761 Dubai, UAE (+971) 04 516 1500
(+966) 11 462 5323
info@citrusconsulting.com
Image Alt

Implementation of Cyberark PAM & EPM For Leading International Islamic Banking Group

Customer Introduction

Implementation of Cyberark PAM & EPM For Leading International Islamic Banking Group

Challenge Overview

Being a banking company its very painful to protect the resources and maintaining the auditing that meets the Auditing team requirements.

Having passwords handy for the users who are accessing resources might be a modern problem in world of malicious insiders. Strong protocols can protect the resources from outsiders but not from malicious insiders.

End Points management is really the hardest part as the organization has vast number of End points.

Blocking administrator access isn’t a great idea when the users actually need the administrative privileges to run a set of applications. But providing administrative access is not acceptable for Auditing teams.

Solution Overview

CyberArk offers session monitoring for the privileged accounts that are onboarded and stored as video recordings. These recordings can later be stored anywhere for auditing purpose.

Now users who are connecting to the accounts don’t know the passwords as entire password management is done by CyberArk.

With CyberArk EPM solution, Now the organization is managing all its end points with a simple user-friendly UI.

EPM will provide the flexibility of providing the privileges only when required on only certain applications which helps in restricting the users from elevating administrative privileges when not required.

Business Value Delivered

IT teams now don’t have to worry about monitoring the logs for suspicious activities instead CyberArk will alert the Auditing teams whenever there is a suspicious activity.

Secured the resources not only from outside attackers but also from malicious insiders by extending the use of Threat Analytics capabilities offered by CyberArk.

Now managing the Endpoints is simple with the user-friendly GUI.

Elevated permissions are restricted to only required applications which can satisfy auditing requirements

Project Info