/
1 min read

CyberArk Enhances Identity and Access Management for Linux with New Identity Bridge

A global leader in identity security, has introduced a new solution designed to modernize identity and access management (IAM) for Linux systems. The new capability, Identity Bridge, addresses a critical gap in security by providing a centralized method for managing authentication and reducing reliance on outdated methods.

Linux systems are a major target for cyberattacks, especially through identity compromises. Traditionally, managing access on these systems required either configuring each system individually or using third-party tools to link Linux systems with Active Directory (AD). However, as organizations shift to cloud-native architectures, these traditional methods often fall short, lacking support for modern authentication techniques such as phishing-resistant multi-factor authentication (MFA) and passwordless capabilities.

Identity Bridge aims to streamline this process by offering an endpoint identity security solution that reduces both management overhead and the risk of identity sprawl. The platform simplifies IAM by integrating Linux environments with both Active Directory and modern cloud Identity Providers (IdPs). This ensures organizations can implement centralized access control and least privilege policies across their entire infrastructure.

The solution is designed to enhance security by enabling continuous authentication and Just-In-Time access, which reduces exposure to potential attacks. CyberArk’s Identity Bridge is integrated with the company’s existing privileged access management and identity tools, providing a comprehensive, defense-in-depth approach to securing IT infrastructure.

Peretz Regev, Chief Product Officer at CyberArk, emphasized that Identity Bridge offers a flexible, directory-agnostic solution for organizations seeking to modernize IAM and improve security visibility, particularly in Linux environments. This new capability is expected to significantly enhance organizations’ ability to combat cyber risks while simplifying the management of their Linux-based systems.

Leave a Reply

Your email address will not be published.