"The Phantom security automation and orchestration platform connects in-house and third-party systems to help security operations gain better insight into potential threats across the IT environment, then reduce the time necessary to detect and respond," Robert Truesdell, director of product management, Phantom. "Phantom apps require privileged credentials to access these systems and that powerful access must be managed and controlled in a consistent, scalable way. That's where our integration with CyberArk becomes so valuable. As our platform continues to expand, we have to be able to centralize the management and security of these privileged application accounts to reduce the attack surface and keep credentials synchronized."C 3 Alliance Drives Channel Opportunities C 3 Alliance members typically integrate with the CyberArk Privileged Account Security Solution. These integrations have expanded opportunities for reseller and system integration partners that can help customers further maximize existing IT investments by driving additional value and insight. "Managing service accounts across multiple technologies continues to be a challenge that our clients face," said Serafino Napoleone, director, Cyber Risk Services at Deloitte. "With expanding C 3 Alliance integration capabilities, our clients are now able to automate and strengthen the Identity and Access Management controls on their existing technologies and platforms, while simultaneously benefitting from increased privileged account security and reduced vulnerability to cyber attacks." "Integrating privileged account security capabilities from CyberArk with other key technologies, such as identity and access governance, allows us to differentiate our business through high-value security services," said Arun Kothanath, chief security strategist, DIT/Clango, Inc. "We view the C 3 Alliance as a tremendous opportunity to deliver an expanding set of innovative solutions to our customers. These solutions help them prioritize privilege as part of their cyber security strategies, such as the ability to centrally manage all identities to mitigate risks and support compliance." Additional Resources View a collection of C 3 Alliance member videos: www.cyberark.com/c3-alliance-videos For more information about the C 3 Alliance, visit: http://www.cyberark.com/partners/technology-partners/ For companies interested in joining the C 3 Alliance, visit: http://www.cyberark.com/contact/ eBook: An Attack Pathway Into Your Organization? There's an App for That About CyberArk CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world's leading companies - including more than 45 percent of the Fortune 100 - to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the CyberArk blog, or follow on Twitter via @CyberArk , LinkedIn or Facebook. Copyright © 2017 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.