* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged accounts and activities associated with datacenter management whether on-premise or in the cloud. As a component of PIM, the Central Policy Manager (CPM) enforces the enterprise policy and automates password management while supporting the following devices: System/Device Vendor Product Operating Systems Microsoft Windows XP,Windows Vista, Windows 7 Windows 2000,2003,2008 Notes: Local and domain accounts Protocols: Windows native,WMI*, SSH* IBM AIX OS/400 OS/390 (RACF , ACF2*) Sun Solaris HP RedHat Linux Novell SUSE Linux* VMware ESX/ESXi Server Apple OS X* Citrix XenServers* HPUX Tru64* NonStop (Tandem)* Open VMS* System/Device Vendor Product Windows Applications Microsoft Databases Oracle Oracle Database Microsoft SQL Server IBM DB2 Informix Sybase Sybase Database MySQL MySQL ODBC [Generic] Any ODBC complient database* Password stored in tables Checkpoint FireWall-1 SPLAT * Provider-1* Nokia Checkpoint FireWall -1 on IPSO* Cisco Systems Juniper Netscreen Fortinet FortiGate (web content filtering)* Fortimanager* Blue Coat Proxy SG* Industrial Defender Security Event Manager* Palo Alto Panorama* IBM DataPower Integration Appliance* SourceFire SourceFire 3D* TippingPoint IPS* SMS* Security Appliances Windows Services Windows Scheduled Tasks IIS Application Pool IIS Directory Security (Annonymous User) Windows Registry COM+ Cluster Service* PIX ACA* IronPort* Mail Gateway* System/Device Applications Network Devices Vendor Product WatchGuard Acme Packet Net-Net OS-E* Critical Path Memova Anti-Abuse* Symantec Brightmail Gateway* SAP SAP Application Server IBM Websphere (connection pool)* BEA WebLogic (connection pool)* JBOSS JBOSS (connection pool)* Oracle Oracle Application ERP* PeopleSoft* Grid Control* Cyber-Ark Digital Vault Tomcat Tomcat (connection pool)* HP HP desktop BIOS Passwords* TIBCO EMS* Cisco Call Manager* Cisco Systems Juniper Router (JUNOS)* Nortel BayStack* VPN Router* Ethernet Routing Switch* Alcatel Switch* Switch (Omniswitch 7000 Series)* F5 BigIP* HP ProCurve* 3com Switch* RuggedCom RuggedSwitch* Firebox X Edge e-series* Firebox X Core e-series* Firebox X Peak e-series* WatchGuard XTM* Router ACS* Switch (Catalyst)* Nexus Switch* System/Device Directories and Credential Storage Remote Control and Monitoring Devices Storage Vendor Product Avaya Media Gateway* BlueCoat PacketShaper* Brocade Silkworm* Radware Voltaire ISR Infiniband Switch* Microsoft Active Directory Sun SunOne Directory Novell Novell eDirectory Unix Vendors UNIX Kerberos* UNIX NIS* RSA/FoxT BOKS/Keon* CA eTrust Access Control* IBM HMC* BladeCenter* IMM* HP iLO Dell DRAC Sun ALOM* Digi CM (Console Management)* Cyclades AlterPath* NetApp NAS filer (including Virtual filers)* VTL* EMC RecoverPoint* ISR Infiniband Switch* ODS1 Load Balancer* Alteon* Linkproof* System/Device Vendor Product Generic Interface SSH/Telnet terminal based devices* Any ODBC compliant database* Passwords stored in database tables (ODBC ) Web interface/application* Windows registry WMI remote command execution* Configuration files (flat, INI, XML) *This plug-in may require customizations or on-site acceptance testing. Please consult Cyber-Ark Sales Engineering for more details. Supporting Additional Systems and Devices Cyber-Ark’s Privileged Identity Management (PIM) Suite is designed and developed using an extensible architecture approach, which provides great flexibility to dynamically support additional managed devices. Cyber-Ark constantly releases CPM plug-ins for new platforms as part of and between official releases of the PIM Suite. In order to support a new managed device, a new plug-in is simply added to the system. Plug-ins are independent components used by the CPM for communicating with specific device types. Cyber-Ark provides a simple and structured process for adding a new device plug-in in a very short timeframe. New plug-ins are added to the system without requiring upgrades to simplify deployment and reduce implementation risks. To learn more about Cyber-Ark's Privileged Identity Management Suite, please email [email protected] or visit our website at www.cyber-ark.com today Cyber-Ark performs full testing on specified device versions, but can provide customers an Acceptance Testing Procedure which allows them to use the product with older or newer versions of these devices, and enables Cyber-Ark to support them. For more information, please contact your Technical Account Manager. All rights reserved. This document contains information and ideas, which are proprietary to Cyber-Ark Software. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, without the prior written permission of Cyber-Ark Software. CPMSD007-0-0-0 Copyright ® 2012 by Cyber-Ark Software.