Apono Success Stories:
Cybereason

Secure Developer On-Demand Access to Production Resources at Scale

OpenWeb – Case Study

Cybereason is a leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, managed monitoring and IR services. Cybereason gives enterprises the upper hand over cyber adversaries.

Head Count

800+

Locations

Boston, Tel Aviv, London, Tokyo

The Challenge:
Secure F5 Production
Access at Scale

The Cybereason team came to us looking for a solution that will easily help to improve its auditing and access management processes in order of providing secured access to F5 on production F5. To do this, the company needed a way to generate temporary permissions upon request using a very granular set of restrictions.

We were looking for a solution that will help us in an easy way to improve the auditing process and the current process of access management, reducing the risk and the attack surface.

Roy Ido
Information Security Manager @Cybereason

Apono allows us to generate temporary permissions upon request on a very granular set of restrictions, delivering huge value to the business by reducing that Excel phase and optimizing the day-to-day work of multiple teams, including the R&D operations and security teams. The product itself is very easy to use from both admin and other sites, and it is very flexible.”

Alan Idelson
Chief Information Security Officer @Cybereason

The Apono Solution:
Just-in-Time Access

By using the Apono, Cybereason is abled to grant elevated access to production resources without hurting productivity, and maintaining a full audit.

01

Just-in-Time (JiT) On-Demand Access

Access that is tailored to the task at hand in both granularity and duration by issuing just-in-time permissions that can be revoked after a pre-defined period or when a task has been completed. simplifying granting, changing, and revoking permissions using the company Slack.

02

Contextual Automatic Access Workflow

Monitor unused access and over-privileges with "Just-in-Time", "Just Enough" conversion suggestions.

03

Continuous Access Monitoring & Conversion to Auto-Revoked Policies

Monitor unused access and over-privileges with “Just-in-Time”, “Just Enough” conversion suggestions.