CyberArk has launched CyberArk Secure Workload Access Solution to deliver comprehensive protection for all non-human identities and enable security teams to gain visibility and control over the entire machine identity lifecycle.

"Modern, cloud and ephemeral workloads mean authentication can be fragmented, making access control challenging and resulting in a large, unprotected attack surface that dramatically increases the risk of breaches," said Kurt Sand, GM of Machine Identity Security at CyberArk.
"Recent high-profile attacks have highlighted the urgent need for a modern, identity-first model that enforces universal and unique workload identities to help organisations confidently secure workloads across their entire hybrid and multi-cloud estate," San added.
CyberArk Secure Workload Access Solution
CyberArk's comprehensive, layered approach is designed to help organisations enforce least privilege, mitigate risk, and prevent credential-based attacks for all workloads across hybrid and multi-cloud environments. This approach provides a sense of security that goes beyond just focusing on singular machine identity types.
It has also extended its discovery and context capabilities, helping security teams modernise workload authentication by assessing, understanding, and eliminating risks tied to unprotected machine identities.
The solution also includes CyberArk Workload Identity Manager, a lightweight, distributed, and cloud-native machine identity issuer integrated with CyberArk Secrets Manager to secure access for all workloads.
Capabilities
The solution is also designed to allow workloads running in virtualised environments to be automatically identified for access to cloud services and provider environments. This adaptability secures dynamic, cloud-native workloads like Kubernetes and service mesh.
It claims to provide the capability to connect on-premises and cloud workloads across environments securely; integrate seamlessly with secrets management for existing API key and access token authentication, as well as other secrets; and discover and assess risk across all workloads.