A PAM system, particularly CyberArk PAM, is an integral component of any company that maintains the security of privileged accounts and access to critical systems. Despite its clear importance, many teams overlook the need for timely updates to their CyberArk PAM instance. This leads to numerous risks: from missing out on new features to more critical issues like vulnerabilities, bugs, or compatibility problems with newer systems.
Using the latest update, 15.0, as an example, we will analyze why it is worth taking care of your PAM system's relevance in time.
Reason 1: More opportunities to interact with the system through the new interface
With each new version, CyberArk gradually migrates various features and settings from the old interface and PrivateArk admin client to the new Modern Interface of the PVWA web portal. In version 15, CyberArk specialists continued to focus on this, and so, thanks to the update, the following features are now available in the new interface:
Reason 2: New features
In addition to continually updating the interface, CyberArk also introduces new features that meet evolving business needs and improve end-user interaction.
So, in the new release, you will find:
1. Vault Remote Manager—a modern feature that allows administrators to securely monitor, manage, and recover Vault from anywhere. The update enables remote, convenient monitoring and management of both Vault operations and disaster recovery (DR) services—and all without requiring direct access to the server.
2. Support for SNPM 3.0 with TLS 1.3—a version that extends the secure monitoring capabilities of PAM Self-Hosted by introducing support for SNMP v3 with TLS 1.3 and combining the authentication and privacy controls of SNMP v3 with the performance and cryptographic strength of the latest TLS 1.3 protocol.
3. Increased integration reliability with a user directory. You get guaranteed continuous authentication, e.g., with Active Directory.
Version 15.0 introduces the ability to specify a fallback user for LDAP integration, eliminating the long-standing single point of failure in directory-based authentication.
Previously, if an LDAP integration account was locked, expired, or misconfigured, all users relying on LDAP authentication could not access PAM. A new fallback mechanism allows administrators to configure a secondary account for LDAP integration that is automatically used when the primary account is unavailable.
4. Auto-reconnect support for PSM sessions. Auto-reconnect is now supported for PSM-RDP sessions, including those launched through the HTML5 Gateway. In case of a temporary network outage, sessions will seamlessly resume, minimizing workflow interruptions and increasing reliability for end users. This improvement provides smoother remote access, especially in environments with unstable connectivity, and reduces the need to restart sessions or re-authenticate.
Reason 3: Fixing vulnerabilities and bugs
Like any software, CyberArk PAM uses third-party components in its systems, which may periodically contain vulnerabilities and bugs. Therefore, it is critical to install security patches with bug fixes or perform a full upgrade to a new version that already contains all the fixes.
Conclusion
The timely transition to CyberArk PAM v15.0 is more than a matter of interface aesthetics or administrator convenience. Actually, this is a strategic move to mitigate risks. By running an outdated version, you’re leaving the 'door open' for attackers to exploit known third-party vulnerabilities while also limiting your team to last-generation tools. New features, such as the Backup LDAP User or Vault Remote Manager, directly impact business continuity and ease of administration.
However, the process of upgrading critical systems requires careful preparation and expertise. To ensure a smooth transition and proper configuration of all new components, you can contact BAKOTECH specialists. Our team provides professional services and full technical assistance for upgrading CyberArk PAM.
Focus on growing your business while we take care of your security. Contact us for a consultation: