CyberArk, an identity security company, has announced the availability of CyberArk Identity Security Platform services hosted from a UAE-based data centre.
These new services bolster CyberArk’s ability to support the data sovereignty needs of key industries in the region, underscoring CyberArk’s ongoing commitment to empower UAE organisations to protect against growing attacks on human and machine identities.
As the UAE continues to encourage a safe and secure digital environment, the ability to store data locally can be an important factor for technology providers. Locally-hosted Software-as-a-Service (SaaS) components of the CyberArk Identity Security Platform mean data – including credentials – can now be managed, processed and stored within the UAE, allowing organisations to tailor their data protection compliance strategy in line with their preferences and local requirements.
“The compromise and abuse of privileged and sensitive access is the most significant identity security threat that organisations face today,” said Tom Lowndes, Director, Middle East at CyberArk. “The CyberArk Identity Security Platform delivers scalable risk reduction to all organisations as well as a simplified and optimised security investment. CyberArk allows cybersecurity teams to apply the right level of privilege controls to identify and secure all types of human and machine identities.”
CyberArk research highlights that nearly all organisations around the world expect to suffer identity-related compromise in the next 12 months, largely stemming from Digital Transformation initiatives like cloud adoption, hybrid working practices and third party-related risk.
CyberArk helps customers throughout the UAE meet their identity security goals, including state-owned and large enterprise organisations across the financial services, telecommunications and energy sectors as well as cloud-native businesses. It also offers the most complete and extensible Identity Security Platform across workforce and customer access, endpoint privilege security, privileged access management, secrets management, cloud privilege security and identity management to enable Zero Trust and enforce least privilege.