SHARE
Facebook X Pinterest WhatsApp

CyberArk Expands Machine Identity Security with New Features

With machine identities outnumbering humans 82 to 1, CyberArk is advancing discovery- and context-driven approaches to address rising identity security challenges.

Written By
thumbnail Luis Millares
Luis Millares
Oct 7, 2025
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Security vendor CyberArk unveiled new discovery and context capabilities for its Machine Identity Security portfolio at the company’s IMPACT World Tour 2025 conference. The enhancements enable security teams to automatically discover, understand, and secure machine identities, including certificates, keys, secrets, and workloads. 

Gaining visibility and control across identities

According to CyberArk, the new features are built to address the growing number of machine identity-related security incidents. The company noted how machine identities now outnumber human identities by 82 to 1, underscoring that manual processes are no longer sufficient to keep pace with this scale.

CyberArk’s research found that 72 percent of security leaders have experienced certificate-related outages, while 50 percent reported breaches stemming from compromised machine identities.

“Implementing machine identity security programs has become increasingly complex as organizations grapple with shrinking certificate lifespans, the rise of AI agents, vault sprawl, and vulnerable software supply chains,” said CyberArk’s GM of machine identity security Kurt Sand. “With these new discovery, context, and remediation capabilities, customers gain the visibility and control they need to tame sprawl, enforce policy and secure their environments more efficiently,” 

Here’s an overview of the key enhancements to CyberArk’s Machine Identity Security portfolio:

CyberArk Secrets Hub:

  • Discovery and Context for HashiCorp Vault – Helps address critical vault sprawl challenges by providing visibility into dispersed HashiCorp Vault instances and ensuring enterprise-wide policy compliance without disrupting developer workflows.
  • Risk Management and Remediation Dashboard – Centralizes observability across secrets vaults and integrates third-party scanner data to identify high-risk areas, enabling organizations to prioritize remediation and track compliance progress.

CyberArk Certificate Manager, SaaS:

  • CA/B Forum TLS Certificate (47-day) Dashboard – Provides real-time visibility into certificate expiration timelines, renewal projections, and certificate authority usage to help organizations prepare for reduced TLS certificate lifespans (from 398 days today to 200 days in 2026, 100 days in 2027, and 47 days by 2029), allowing them to easily manage renewals and prevent outages.
  • Code Sign Management, Policy Enforcement and Deep DevOps Integrations – Delivers automated, policy-enforced code signing and governance alongside certificate lifecycle management to reduce infrastructure overhead, accelerate adoption, and help ensure only compliant software is released.

CyberArk SSH Manager for Machines:

  • New Authorization and Policy Controls – Grant real-time authorization tracking and discovery for centralized visibility, risk reduction, and audit compliance to better manage SSH key sprawl and unmitigated access.

Fostering ‘Identity-first’ MSPs

Sand emphasized that the new capabilities complement CyberArk’s recent acquisition of machine identity management company Venafi, as the company positions itself to become a leading provider in end-to-end machine identity security.

These new context and discovery features also highlight CyberArk’s ongoing push to support the growth of identity-first MSPs.

In June, the company introduced a new SaaS-based console and an enhanced partner program aimed at helping MSPs expand their identity security offerings.

Named the CyberArk MSP Hub, the new console connects directly to all managed CyberArk instances, helping reduce operational overhead and accelerate the rollout of converged identity services.

The enhanced partner program was also tailored for MSPs, featuring dedicated SKUs, tiered discounts, and go-to-market support to encourage adoption of CyberArk’s full identity security platform and help partners grow their identity security practices.

Earlier this year, CyberArk’s 2025 State of Machine Identity Security report highlighted the widening gap between machine identity growth and the security measures needed to protect them.

thumbnail Luis Millares

Luis Millares has extensive experience reviewing virtual private networks (VPNs), password managers, and other security software. He has tested and reviewed numerous forms of tech, covering consumer technology like smartphones and laptops, all the way to enterprise software and cybersecurity products. He has authored over 450 online articles on technology and has worked for the leading tech journalism site in the Philippines, YugaTech.com. He currently contributes to the Daily Tech Insider newsletter, providing well-researched insights and coverage of the latest in technology.

Recommended for you...

11:11 Systems Study Shows Security Concerns Worldwide
OPSWAT Launches MetaDefender Drive for Handheld Security
Jordan Smith
Oct 7, 2025
API Security Risks and AI Threats: Expert Insights
Delinea Exec: Identity Security Crucial to Federal Agencies
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.