{"id":801017,"date":"2025-01-15T08:33:07","date_gmt":"2025-01-15T13:33:07","guid":{"rendered":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/"},"modified":"2025-01-15T08:33:07","modified_gmt":"2025-01-15T13:33:07","slug":"cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats","status":"publish","type":"post","link":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/","title":{"rendered":"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats"},"content":{"rendered":"<p>        <!--.bwalignc { text-align: center; list-style-position: inside }\n.bwlistdisc { list-style-type: disc }body {font:normal small Arial,Helvetica,sans-serif;color:#000;background-color:#fff;padding:24px;margin:0;} a img {border:0;} h3 {font-size:medium;color:#000;margin:0 0 1em 0; text-align:center;}-->  <\/p>\n<p class=\"bwalignc\"><b>CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats<\/b><\/p>\n<p>NEWTON, Mass. &amp; PETACH TIKVA, Israel&#8211;(<a href=\"http:\/\/www.businesswire.com\">BUSINESS WIRE<\/a>)&#8211;<a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.cyberark.com%2F&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=CyberArk&amp;index=1&amp;md5=a5f758f7110a149637123afb29ba97d8\">CyberArk<\/a> (NASDAQ: <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Finvestors.cyberark.com%2Fhome%2Fdefault.aspx&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=CYBR&amp;index=2&amp;md5=32fb7e86d54bad0ed5ae881048b298a4\">CYBR<\/a>) today announced a new integration between <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.cyberark.com%2Fproducts%2Fprivileged-access-manager%2F&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=CyberArk+Privileged+Access+Manager&amp;index=3&amp;md5=4297f3b90b2d877985557d2f24c9ca91\">CyberArk Privileged Access Manager<\/a> (PAM) and Microsoft Defender for Identity, giving organizations a unified, comprehensive view of their entire identity security landscape to allow quicker, more effective threat response and containment.<\/p>\n<p>\nDefender for Identity is a cloud-based identity security solution that helps protect customers\u2019 on-premises identities from advanced threats and manage identity risk. Fully integrated with Microsoft Defender XDR, it uses signals across hybrid identity environments and other workloads to help Security Operations (SecOps) teams better identify, detect and investigate advanced threats directed at their organization.<\/p>\n<p>\nCyberArk Privileged Access Manager is a component of the <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.cyberark.com%2Fproducts%2F&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=CyberArk+Identity+Security+Platform&amp;index=4&amp;md5=bb2adf8ea554788e55aa1e603e3a471d\">CyberArk Identity Security Platform<\/a>, providing best-in-class controls to discover, secure and measure privileged access for IT and cloud ops teams migrating, scaling and operating applications in hybrid and multi-cloud environments.<\/p>\n<p>\nThe integration between CyberArk Privileged Access Manager and Defender for Identity provides organizations with enhanced privileged access control and monitoring capabilities alongside streamlined privileged access workflows. By connecting data from diverse systems, Security Operations Center (SOC) and Identity teams will benefit from deeper investigative capabilities: quicker and more effective threat-hunting efforts, more precise attack path identification, and more comprehensive remediation options. These combined capabilities enable greater cyber resilience.<\/p>\n<p>\n\u201cThrough the <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.cyberark.com%2Fpartners%2Falliance-partners%2F&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=CyberArk+C%26%23179%3B+Alliance%26%238217%3Bs&amp;index=5&amp;md5=4c4d5053b0f9469d1cf6105ba2afb763\">CyberArk C\u00b3 Alliance\u2019s<\/a> diverse ecosystem of partners, we continue to provide unparalleled protection for shared customers against identity-centric attacks,\u201d said Clarence Hinton, Chief Strategy Officer at CyberArk. \u201cCyberArk\u2019s privileged access management integration with Defender for Identity allows organizations to maximize their existing investment and simplify their efforts to protect identities across their on-premises and multi-cloud environments.\u201d<\/p>\n<p><b>Further Reading<\/b><\/p>\n<ul class=\"bwlistdisc\">\n<li>\nMicrosoft Defender XDR Blog: \u201c<a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Ftechcommunity.microsoft.com%2Fblog%2Fmicrosoftthreatprotectionblog%2Fignite-news-seamless-protection-for-your-on-prem-identities-with-defender-for-id%2F4303398&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=Seamless+protection+for+your+on-premises+identities&amp;index=6&amp;md5=af173248577e04a85beb59d12edf5336\">Seamless protection for your on-premises identities<\/a>\u201d.<\/p>\n<\/li>\n<li>\nCyberArk Marketplace: Microsoft Defender for Identity <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fcommunity.cyberark.com%2Fmarketplace%2Fs%2F%23a35Ht0000018sDVIAY-a39Ht000004GLaEIAW&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=integration&amp;index=7&amp;md5=daf3b7c6439c1669cb7651cb9ca1bc5c\">integration<\/a>.<\/p>\n<\/li>\n<li><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.cyberark.com%2Fproducts%2Fprivileged-access-manager%2F&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=CyberArk+Privileged+Access+Manager&amp;index=8&amp;md5=ae6d5311d3c3e4c1587162b5f1e0f48f\">CyberArk Privileged Access Manager<\/a>.\n<\/li>\n<\/ul>\n<p><b>About CyberArk<br \/>\n<br \/><\/b><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.cyberark.com%2F&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=CyberArk&amp;index=9&amp;md5=4df6f4ad4013621fb98ae87f7c39cef5\"><b>CyberArk<\/b><\/a> (NASDAQ: <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Finvestors.cyberark.com%2F&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=CYBR&amp;index=10&amp;md5=6e7d34a717698398dcfbbe600a2c5e8b\"><b>CYBR<\/b><\/a>) is the global leader in identity security. Centered on <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.cyberark.com%2Fproducts%2Fprivileged-access%2F&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=intelligent+privilege+controls&amp;index=11&amp;md5=a87ba06ae11484c362ff470e43ff7f84\"><b>intelligent privilege controls<\/b><\/a>, CyberArk provides the most comprehensive security offering for any identity \u2013 human or machine \u2013 across business applications, distributed workforces, hybrid cloud environments and throughout the DevOps lifecycle. The world\u2019s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.cyberark.com%2F&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=https%3A%2F%2Fwww.cyberark.com&amp;index=12&amp;md5=87af86fc5bacdd1e2b88c69ff31c6b1c\"><b>https:\/\/www.cyberark.com<\/b><\/a>, read the <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fall-blog-posts&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=CyberArk+blogs&amp;index=13&amp;md5=070a2dd79ed6e59d782d83c6974ae241\"><b>CyberArk blogs<\/b><\/a> or follow on <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fcyber-ark-software%2F&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=LinkedIn&amp;index=14&amp;md5=20584c577b28b5645703913a37627ac9\"><b>LinkedIn<\/b><\/a>, <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Ftwitter.com%2FCyberArk&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=X&amp;index=15&amp;md5=894165e4b769f10a34960c6445e81311\"><b>X<\/b><\/a>, <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.facebook.com%2FCyberArk&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=Facebook&amp;index=16&amp;md5=f60653c282f5370e773213b684977e89\"><b>Facebook<\/b><\/a> or <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.youtube.com%2Fuser%2Fcyberarksoftware&amp;esheet=54179703&amp;newsitemid=20250115594773&amp;lan=en-US&amp;anchor=YouTube&amp;index=17&amp;md5=6cfa0af2eba994f32c66b101a43a9230\"><b>YouTube<\/b><\/a>.<\/p>\n<p><i>Copyright \u00a9 2025 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.<\/i><\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/cts.businesswire.com\/ct\/CT?id=bwnews&amp;sty=20250115594773r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en\" style=\"width:0;height:0\" \/><span class=\"bwct31415\" \/><\/p>\n<p id=\"mmgallerylink\"><span id=\"mmgallerylink-phrase\">View source version on businesswire.com: <\/span><span id=\"mmgallerylink-link\"><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250115594773\/en\/\" rel=\"nofollow\">https:\/\/www.businesswire.com\/news\/home\/20250115594773\/en\/<\/a><\/span><\/p>\n<p><b>Investor Relations:<br \/>\n<br \/><\/b>Srinivas Anantha, CFA<br \/>\n<br \/>CyberArk<br \/>\n<br \/>617-558-2132<br \/>\n<br \/><a rel=\"nofollow\" href=\"mailto:ir@cyberark.com\">ir@cyberark.com<\/a><\/p>\n<p><b>Media:<br \/>\n<br \/><\/b>Nick Bowman<br \/>\n<br \/>CyberArk<br \/>\n<br \/>+44 (0) 7841 673378<br \/>\n<br \/><a rel=\"nofollow\" href=\"mailto:press@cyberark.com\">press@cyberark.com<\/a><\/p>\n<p><b>KEYWORDS:<\/b> United States North America Israel Middle East Massachusetts<\/p>\n<p><b>INDUSTRY KEYWORDS:<\/b> Apps\/Applications Technology Mobile\/Wireless Security Telecommunications Software Networks Internet Data Management<\/p>\n<p><b>MEDIA:<\/b><\/p>\n<table cellpadding=\"3\" cellspacing=\"3\">\n<tr>\n<td><font face=\"Arial\" size=\"2\"><b>Logo<\/b><\/font><\/td>\n<\/tr>\n<tr>\n<td><img decoding=\"async\" src=\"https:\/\/mms.businesswire.com\/media\/20250115594773\/en\/1950794\/3\/CyberArk_Logo_November_2023.jpg\" alt=\"Logo\" \/><\/td>\n<\/tr>\n<tr>\n<td><font face=\"Arial\" size=\"2\"><\/font><\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats NEWTON, Mass. &amp; PETACH TIKVA, Israel&#8211;(BUSINESS WIRE)&#8211;CyberArk (NASDAQ: CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organizations a unified, comprehensive view of their entire identity security landscape to allow quicker, more effective threat response and containment. Defender for Identity is a cloud-based identity security solution that helps protect customers\u2019 on-premises identities from advanced threats and manage identity risk. Fully integrated with Microsoft Defender XDR, it uses signals across hybrid identity environments and other workloads to help Security Operations (SecOps) teams better identify, detect and investigate advanced threats directed at their organization. CyberArk Privileged Access Manager is &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-801017","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats - Market Newsdesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats - Market Newsdesk\" \/>\n<meta property=\"og:description\" content=\"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats NEWTON, Mass. &amp; PETACH TIKVA, Israel&#8211;(BUSINESS WIRE)&#8211;CyberArk (NASDAQ: CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organizations a unified, comprehensive view of their entire identity security landscape to allow quicker, more effective threat response and containment. Defender for Identity is a cloud-based identity security solution that helps protect customers\u2019 on-premises identities from advanced threats and manage identity risk. Fully integrated with Microsoft Defender XDR, it uses signals across hybrid identity environments and other workloads to help Security Operations (SecOps) teams better identify, detect and investigate advanced threats directed at their organization. CyberArk Privileged Access Manager is &hellip; Continue reading &quot;CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Market Newsdesk\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-15T13:33:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cts.businesswire.com\/ct\/CT?id=bwnews&amp;sty=20250115594773r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en\" \/>\n<meta name=\"author\" content=\"Newsdesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newsdesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/\"},\"author\":{\"name\":\"Newsdesk\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"headline\":\"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats\",\"datePublished\":\"2025-01-15T13:33:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/\"},\"wordCount\":475,\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cts.businesswire.com\\\/ct\\\/CT?id=bwnews&amp;sty=20250115594773r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/\",\"name\":\"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats - Market Newsdesk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cts.businesswire.com\\\/ct\\\/CT?id=bwnews&amp;sty=20250115594773r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en\",\"datePublished\":\"2025-01-15T13:33:07+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cts.businesswire.com\\\/ct\\\/CT?id=bwnews&amp;sty=20250115594773r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en\",\"contentUrl\":\"https:\\\/\\\/cts.businesswire.com\\\/ct\\\/CT?id=bwnews&amp;sty=20250115594773r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\",\"name\":\"Market Newsdesk\",\"description\":\"Latest Business News in Real Time\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\",\"name\":\"Newsdesk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"caption\":\"Newsdesk\"},\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/author\\\/newsdesk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats - Market Newsdesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/","og_locale":"en_US","og_type":"article","og_title":"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats - Market Newsdesk","og_description":"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats NEWTON, Mass. &amp; PETACH TIKVA, Israel&#8211;(BUSINESS WIRE)&#8211;CyberArk (NASDAQ: CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organizations a unified, comprehensive view of their entire identity security landscape to allow quicker, more effective threat response and containment. Defender for Identity is a cloud-based identity security solution that helps protect customers\u2019 on-premises identities from advanced threats and manage identity risk. Fully integrated with Microsoft Defender XDR, it uses signals across hybrid identity environments and other workloads to help Security Operations (SecOps) teams better identify, detect and investigate advanced threats directed at their organization. CyberArk Privileged Access Manager is &hellip; Continue reading \"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats\"","og_url":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/","og_site_name":"Market Newsdesk","article_published_time":"2025-01-15T13:33:07+00:00","og_image":[{"url":"https:\/\/cts.businesswire.com\/ct\/CT?id=bwnews&amp;sty=20250115594773r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en","type":"","width":"","height":""}],"author":"Newsdesk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newsdesk","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/#article","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/"},"author":{"name":"Newsdesk","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"headline":"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats","datePublished":"2025-01-15T13:33:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/"},"wordCount":475,"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/cts.businesswire.com\/ct\/CT?id=bwnews&amp;sty=20250115594773r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/","url":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/","name":"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats - Market Newsdesk","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/cts.businesswire.com\/ct\/CT?id=bwnews&amp;sty=20250115594773r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en","datePublished":"2025-01-15T13:33:07+00:00","author":{"@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"breadcrumb":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/#primaryimage","url":"https:\/\/cts.businesswire.com\/ct\/CT?id=bwnews&amp;sty=20250115594773r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en","contentUrl":"https:\/\/cts.businesswire.com\/ct\/CT?id=bwnews&amp;sty=20250115594773r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en"},{"@type":"BreadcrumbList","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cyberark-integration-with-microsoft-defender-for-identity-speeds-identification-and-containment-of-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.marketnewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.marketnewsdesk.com\/#website","url":"https:\/\/www.marketnewsdesk.com\/","name":"Market Newsdesk","description":"Latest Business News in Real Time","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.marketnewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979","name":"Newsdesk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","caption":"Newsdesk"},"url":"https:\/\/www.marketnewsdesk.com\/index.php\/author\/newsdesk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/801017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=801017"}],"version-history":[{"count":0,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/801017\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=801017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=801017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=801017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}