Hydden for CyberArk + Palo Alto Networks

Hydden accelerates CyberArk adoption with complete and accurate continuous discovery of every identity for CyberArk PAM and Modern IGA, including every identity with access to Palo Alto Networks solutions

Real-time & Dynamic PAM Control

Hydden’s real-time continuous discovery capabilities complement CyberArk by automatically detecting and onboarding new or modified privileged accounts, ensuring your vault always reflects the current state of privileged credentials across your organization. Every account with access to a Palo Alto Network solution is included in the discovery for ongoing management into CyberArk PAM and IGA.

Control Privileged Identity Sprawl

The dynamic nature of modern hybrid multicloud infrastructure means privileged accounts are created and modified faster than ever before. Hydden helps you maintain control by ensuring every privileged identity—whether human or machine—is automatically discovered and secured in your CyberArk Safe.

Enforce Privileged Account Hygiene

Hydden helps ensure strong identity hygiene by continuously monitoring and mapping every privileged account across your enterprise to its rightful owner. By automatically onboarding discovered accounts to your CyberArk Safe, Hydden ensures complete visibility and control over your privileged identity landscape.

Hydden Delivers Real-time Security Controls to CyberArk Customers

.

Together, CyberArk and Hydden:

 

  • Ensures organizations attain total coverage of their most critical privileged human and machine identities across all on-premise or SaaS infrastructure, applications, devices and systems through our continuous discovery and classification process, including every account with access to Palo Alto Network products.
  • Guarantee every single privileged account is optimally configured with automated mapping, linking your users to their human and machine accounts to manage every account’s security posture and lifecycle.
  • Automatically uncover privileged accounts that were not found during CyberArk’s Discovery and are not managed in your CyberArk Privileged Access Manager vault and take remediating action by adding these identities directly to a Safe. Classify and vault every password, SSH key, or security key/token with the vault you already own.
  • Extend CyberArk Modern IGA with audit-ready coverage by broadening the scope of access reviews to include non-standard apps and devices, while Hydden’s continuous data assurance guarantees complete, accurate evidence for every certification cycle.

Expose blind spots in your PAM program by uncovering accounts that bypass CyberArk’s discovery, including potentially dangerous backdoor accounts. Hydden streamlines remediation by automatically adding unmanaged credentials into EPV/Privileged Cloud for rotation and policy control.

Bring accounts from non-standard and custom systems into CyberArk’s Modern Identity Governance Automation certification campaigns. Continuous data validation checks ensure your IGA works off provably trustworthy, audit ready identity data.

Identify and vault local admin accounts across Windows, Mac, and Linux endpoints, including any Palo Alto Network device. Enforce least privilege for every account across your identity ecosystem with granular control of identities and their access entitlements based on group membership and roles.

Enrich CyberArk’s identity data with account ownership, usage, and threat analysis to add more context for remediating risks. CyberArk PAM can now easily prioritize managing risky privileged accounts and IGA can reliably de-provision and run separation of duties checks.