Home Platform Integrations CyberArk CyberArk Credential Integrations Minimize the risk of data breaches caused by unauthorized access with integrated support for CyberArk. Contact us Solve the Challenges of Credential Management Commvault’s integration with CyberArk enhances security by separating credential storage from backup environments. This helps organizations follow strong zero-trust practices and comply with strict regulations. Align with zero-trust Separate the storage and management of credentials from the Commvault platform to adhere to Zero Trust architecture principles. Reduce risk and complexity Credentials are provided only as needed for backups, then immediately rotated, which reduces the risk of credentials being leaked, exposed, and used nefariously. Ensure regulatory compliance Audit and manage credentials through CyberArk to align with internal and industry compliance regulations (PCI, HIPPA, Cyber Insurance policies). Learn more Commvault Cyberark Integration Secrets Manager The direct integration of CyberArk Secrets Management with Commvault enhances the lifecycle management of service accounts and secret keys, with a prime focus on securing backups and Commvault infrastructure configurations. The “Just in Time” feature ensures credentials are accessed only when necessary. By eliminating the need for storing credentials within the Commvault application, this integration significantly reduces the risk of credential leakage, simplifying processes and bolstering overall security. Application plugin The CyberArk Privileged Credential Management plugin offers a powerful solution for managing and rotating local user account credentials within Commvault. It enhances privileged access lifecycle management and improves policy compliance for local Commvault login accounts. This enhances security measures, reduces unauthorized access risk, and ensures a compliant operational environment. CommCell PSM plugin The CyberArk Privileged Session Management plugin streamlines administrative access into Commvault. It hides admin credentials from end-users, minimizing credential leakage risk, and enables organizations to create and maintain complex machine-generated passwords for secure access. The result is improved security and smoother administrative processes, enhancing data protection and efficiency in organizations. Related capabilities Explore next-generation capabilities that intelligently engage and surface cyber risks, minimize active data threats, and drive intelligent, more informed recovery outcomes, faster. View all capabilities Cyber Resilience Foundation Protection, Autonomous Recovery, plus data security posture capabilities that scan for risks, find and categorize sensitive data, and remediate issues to ensure compliance. Learn more Threat Scan Defend backup data by proactively identifying malware threats to avoid reinfection during recovery. Learn more ThreatWise Surface zero-day and unknown threats in production – before data is impacted and it’s time to recover. Learn more