Digital Media Net - Your Gateway To Digital media Creation. News and information on Digital Video, VR, Animation, Visual Effects, Mac Based media. Post Production, CAD, Sound and Music
Categories: News

CyberArk Extends Endpoint Privilege Manager Capabilities to Support Linux Platforms

  • Enables users to protect Linux systems by applying and enforcing least privilege policies and just-in-time elevation
  • Latest update delivers a new, unified interface for protecting endpoints across Windows, Linux and Mac platforms

NEWTON, Mass. & PETACH TIKVA, Israel–(BUSINESS WIRE)–CyberArk (NASDAQ: CYBR), the global leader in Identity Security, today announced new CyberArk Endpoint Privilege Manager functionality that extends protection to Linux platforms. Now, security and IT professionals can easily enforce least privilege and implement foundational just-in-time security controls across Linux endpoints in any environment.

Linux is widely applicable to various types of operations – everything from smartphones to cloud computing – and runs 90% of all public cloud workloads. In a recent survey, 83.1% of developers said Linux is the platform they prefer to work on. It’s so popular that in 2021, Linux ran on 100% of the world’s 500 supercomputers.

However, many Linux administrators find it challenging to enforce least privilege policies on DevOps engineers or application owners that access Linux servers while maintaining least privilege controls on Linux machines without creating friction for end users. CyberArk Endpoint Privilege Manager for Linux is a SaaS solution that provides simple and easy configuration and enforcement of least privilege policy. Linux administrators benefit from capabilities that enable them to quickly build the right policy rules for their users and reduce the manual work typically required to maintain these policies.

Endpoint Privilege Manager for Linux can monitor and automatically detect privileged activity. It then helps administrators decide whether privileged access rights should be approved or blocked, and easily update the policy accordingly. Security teams and Linux administrators gain critical visibility and control over what users can run and execute on Linux systems. Additional capabilities include:

  • Standard sudo command syntax for smooth adoption
  • Sudo with password prompt or passwordless
  • Configurable policy audit reports for compliance and forensics
  • Rest APIs for policy automation and external system integration
  • Agent CLI for support and status monitoring
  • Upgrade or uninstall agents directly from the SaaS console

Endpoint Privilege Manager administrators can also now define and execute policies via a unified management console interface for protecting the organizations’ endpoints across Windows, Linux and Mac platforms.

“Endpoint privilege management solutions provide foundational security controls that are missing across a large number of organizations – opening them up to cybersecurity risk. These controls are especially important as businesses continue to prioritize digital transformation and mature and accelerate cloud adoption,” said Barak Feldman, senior vice president, CyberArk. “Endpoint Privilege Manager for Linux extends flexible, robust and scalable least privilege capabilities of the CyberArk Identity Security Platform over Linux endpoints – workstations and especially servers – while delivering just in time controls and automation that lift the manual burden on Linux administrators.”

Availability and Licensing

CyberArk Endpoint Privilege Manager for Linux is available now. Existing customers can leverage their existing Endpoint Privilege Manager SaaS tenants and expertise with no additional training or special licensing. For more details, visit: https://www.cyberark.com/products/endpoint-privilege-manager/

About CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn or Facebook.

Copyright © 2022 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

Contacts

Media Contacts:
Liz Campbell, CyberArk

Email: press@cyberark.com

Highwire PR

Email: cyberark@highwirepr.com

Investor Relations:
Erica Smith, CyberArk

Email: ir@cyberark.com

Staff

Recent Posts

Burglars Attacked for Hours. The Champion Safe Never Opened.

Relentless Break-In Attempts Put Champion Safe to the Ultimate Real-World Test PROVO, UT / ACCESS…

2 hours ago

Financial Hardship Doesn’t Always Stop IRS Collections – Clear Start Tax Explains When Relief Is Actually Granted

Tax professionals say many taxpayers assume financial struggles automatically pause IRS enforcement, but relief programs…

2 hours ago

Cycurion (Nasdaq: CYCU) Announces Definitive Agreement to Acquire Federal Cybersecurity Firm and Reports Record Contracted Backlog Exceeding $150 Million

MCLEAN, VA / ACCESS Newswire / March 16, 2026 / Cycurion, Inc. (Nasdaq:CYCU), a leading…

2 hours ago

Counsel Financial Appoints Two Directors to Support Portfolio Growth and Capital Provider Solutions

Strategic hires enhance Counsel Financial's continued growth in plaintiff law firm financing and capital provider…

2 hours ago

Cardiff Lexington Announces Fourth Quarter and Full Year 2025 Financial Results

39.5% increase in FY25 total revenue to $11.5 million compared to FY 202462.7% increase in…

2 hours ago

SMX Secures the Global Race for Rare Earths and Critical Minerals

NEW YORK CITY, NY / ACCESS Newswire / March 16, 2026 / SMX (Security Matters)…

2 hours ago