Download CPM Supported Device - Inter

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Asynchronous I/O wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Transcript
List of Supported Systems & Devices
February 2012
Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified
policy-based solution that secures, manages and monitors all privileged accounts and
activities associated with datacenter management whether on-premise or in the cloud.
As a component of PIM, the Central Policy Manager (CPM) enforces the enterprise policy
and automates password management while supporting the following devices:
System/Device
Vendor
Product
Operating Systems
Microsoft
 Windows XP,Windows Vista,
Windows 7
 Windows 2000,2003,2008
Notes:
 Local and domain accounts
 Protocols: Windows native,WMI*,
SSH*
IBM
 AIX
 OS/400
 OS/390 (RACF , ACF2*)
Sun
 Solaris
HP




RedHat
 Linux
Novell
 SUSE Linux*
VMware
 ESX/ESXi Server
Apple
 OS X*
Citrix
 XenServers*
HPUX
Tru64*
NonStop (Tandem)*
Open VMS*
System/Device
Vendor
Product
Windows Applications
Microsoft




Databases
Oracle
 Oracle Database
Microsoft
 SQL Server
IBM
 DB2
 Informix
Sybase
 Sybase Database
MySQL
 MySQL
ODBC [Generic]
 Any ODBC complient database*
 Password stored in tables
Checkpoint
 FireWall-1
 SPLAT *
 Provider-1*
Nokia
 Checkpoint FireWall -1 on IPSO*
Cisco Systems




Juniper
 Netscreen
Fortinet
 FortiGate (web content filtering)*
 Fortimanager*
Blue Coat
 Proxy SG*
Industrial Defender
 Security Event Manager*
Palo Alto
 Panorama*
IBM
 DataPower Integration Appliance*
SourceFire
 SourceFire 3D*
TippingPoint
 IPS*
 SMS*
Security Appliances
Windows Services
Windows Scheduled Tasks
IIS Application Pool
IIS Directory Security (Annonymous
User)
 Windows Registry
 COM+
 Cluster Service*
PIX
ACA*
IronPort*
Mail Gateway*
System/Device
Applications
Network Devices
Vendor
Product
WatchGuard




Acme Packet
 Net-Net OS-E*
Critical Path
 Memova Anti-Abuse*
Symantec
 Brightmail Gateway*
SAP
 SAP Application Server
IBM
 Websphere (connection pool)*
BEA
 WebLogic (connection pool)*
JBOSS
 JBOSS (connection pool)*
Oracle
 Oracle Application ERP*
 PeopleSoft*
 Grid Control*
Cyber-Ark
 Digital Vault
Tomcat
 Tomcat (connection pool)*
HP
 HP desktop BIOS Passwords*
TIBCO
 EMS*
Cisco
 Call Manager*
Cisco Systems




Juniper
 Router (JUNOS)*
Nortel
 BayStack*
 VPN Router*
 Ethernet Routing Switch*
Alcatel
 Switch*
 Switch (Omniswitch 7000 Series)*
F5
 BigIP*
HP
 ProCurve*
3com
 Switch*
RuggedCom
 RuggedSwitch*
Firebox X Edge e-series*
Firebox X Core e-series*
Firebox X Peak e-series*
WatchGuard XTM*
Router
ACS*
Switch (Catalyst)*
Nexus Switch*
System/Device
Directories and Credential
Storage
Remote Control and Monitoring
Devices
Storage
Vendor
Product
Avaya
 Media Gateway*
BlueCoat
 PacketShaper*
Brocade
 Silkworm*
Radware




Voltaire
 ISR Infiniband Switch*
Microsoft
 Active Directory
Sun
 SunOne Directory
Novell
 Novell eDirectory
Unix Vendors
 UNIX Kerberos*
 UNIX NIS*
RSA/FoxT
 BOKS/Keon*
CA
 eTrust Access Control*
IBM
 HMC*
 BladeCenter*
 IMM*
HP
 iLO
Dell
 DRAC
Sun
 ALOM*
Digi
 CM (Console Management)*
Cyclades
 AlterPath*
NetApp
 NAS filer (including Virtual filers)*
 VTL*
EMC
 RecoverPoint*
ISR Infiniband Switch*
ODS1 Load Balancer*
Alteon*
Linkproof*
System/Device
Vendor
Product
Generic Interface
SSH/Telnet terminal based devices*
Any ODBC compliant database*
Passwords stored in database tables (ODBC )
Web interface/application*
Windows registry
WMI remote command execution*
Configuration files (flat, INI, XML)
*This plug-in may require customizations or on-site acceptance testing. Please consult
Cyber-Ark Sales Engineering for more details.
Supporting Additional Systems and Devices
Cyber-Ark’s Privileged Identity Management (PIM) Suite is designed
and developed using an extensible architecture approach, which
provides great flexibility to dynamically support additional managed
devices. Cyber-Ark constantly releases CPM plug-ins for new platforms
as part of and between official releases of the PIM Suite.
In order to support a new managed device, a new plug-in is simply
added to the system. Plug-ins are independent components used by
the CPM for communicating with specific device types.
Cyber-Ark provides a simple and structured process for adding a new
device plug-in in a very short timeframe. New plug-ins are added to
the system without requiring upgrades to simplify deployment and
reduce implementation risks.
To learn more about
Cyber-Ark's Privileged
Identity Management
Suite, please email
[email protected]
or visit our website at
www.cyber-ark.com
today
Cyber-Ark performs full testing on specified device versions, but can provide customers an
Acceptance Testing Procedure which allows them to use the product with older or newer
versions of these devices, and enables Cyber-Ark to support them. For more information,
please contact your Technical Account Manager.
All rights reserved. This document contains information and ideas, which are proprietary to Cyber-Ark
Software. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any
form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, without the
prior written permission of Cyber-Ark Software.
CPMSD007-0-0-0
Copyright ® 2012 by Cyber-Ark Software.