CyberArk > 实例探究 > Fortune 100 Insurance Company Implements CyberArk Blue Prism Integration to Secure RPA Deployments and Accelerate Operational Agility

Fortune 100 Insurance Company Implements CyberArk Blue Prism Integration to Secure RPA Deployments and Accelerate Operational Agility

CyberArk Logo
公司规模
1,000+
国家
  • United States
产品
  • CyberArk Core Privileged Access Security Solution
  • CyberArk Application Access Manager
  • Blue Prism Digital Workforce Platform
技术栈
  • RPA
  • Active Directory
  • SAP
  • LDAP
实施规模
  • Enterprise-wide Deployment
影响指标
  • Cost Savings
  • Customer Satisfaction
  • Digital Expertise
  • Productivity Improvements
技术
  • 网络安全和隐私 - 身份认证管理
  • 网络安全和隐私 - 安全合规
  • 功能应用 - 远程监控系统
适用行业
  • 金融与保险
适用功能
  • 商业运营
  • 质量保证
用例
  • 预测性维护
  • 过程控制与优化
  • 远程资产管理
服务
  • 网络安全服务
  • 软件设计与工程服务
  • 系统集成
关于客户
The customer is a Fortune 100 insurance company, a global provider in the insurance industry with over 10,000 employees. The company is engaged in a multi-year digital transformation journey aimed at achieving agile development at scale. To support this initiative, the application development team has embraced Blue Prism’s Robotic Process Automation (RPA) technologies to automate operational activities, test new applications, and accelerate operational agility. The company has integrated 10 business-critical applications, including SAP, Windows, and Lightweight Directory Access Protocol (LDAP), into the Blue Prism Digital Workforce Platform as part of a proof of concept. The company is highly focused on maintaining a high level of security for its new digital workforce, especially concerning privileged access to robotic credentials.
挑战
According to the 2018 Deloitte Global RPA Survey, 53 percent of organizations have already started their RPA journey to help robotize repetitive routine tasks and drive digital transformation. RPA adoption is expected to increase to 72 percent in the next two years, and if it continues at its current level, RPA will have achieved near-universal adoption within the next five years. It’s not hard to see why – the same study points to total ROI in less than 12 months, with significantly improved compliance, quality, accuracy, productivity and cost reduction. This global insurance provider has embarked on a multi-year digital transformation journey aimed at achieving agile development at scale. To help steer this strategic initiative, the company’s application development team has embraced Blue Prism’s RPA technologies to automate operational activities, test new applications and accelerate operational agility. Over the past 12 months as part of a proof of concept, the firm integrated 10 business critical applications – including SAP, Windows and Lightweight Directory Access Protocol (LDAP) – into the Blue Prism Digital Workforce Platform. To interact directly with business applications, RPA software must mimic the way applications use and mirror human credentials and entitlements. This can introduce significant risk when the software robots automate and perform business processes – whether logging into a system to access data or moving a process from one step to the next. Often times, the credentials being used are hardcoded directly within the application. If an attacker successfully steals these credentials, they can ultimately take full control over the robot and gain access to target critical systems, applications and data. Fully understanding these risks, the CVP of Privileged Access Management at the firm, made securing privileged access to these robotic credentials a top priority.
解决方案
As the company progressed along its digital transformation journey, aligning security and risk postures across new tools and technologies became crucial. With full top-down support from the CIO, the CVP’s security software team and the security risk team began working alongside the RPA team to integrate strong security policies and standards into the RPA program from day one. A long-time CyberArk user for numerous privileged access security applications across the enterprise and in the cloud, the CVP was impressed by CyberArk’s existing integration with Blue Prism. Confident that CyberArk was the right partner for this important initiative, the team quickly began to deploy the CyberArk solution. To lock down the firm’s powerful RPA credentials, all software robots must first log in using a shared service account in Active Directory, then log into the specific application server it needs to access. From there, CyberArk continuously monitors and controls all privileged access activity within that server with the CyberArk Core Privileged Access Security Solution. This eliminates the need to put a powerful credential – such as a domain credential – into the application’s server for the robots to utilize. Additionally, instead of storing credentials within the application, software robots can request and retrieve credentials from CyberArk’s centralized, encrypted vault on demand, via CyberArk Application Access Manager, to perform their necessary tasks.
运营影响
  • Combining Blue Prism with CyberArk enables best-in-breed credential management and more secure deployments, while providing the firm’s team with seamless integration into existing CyberArk infrastructure and management policies across the enterprise.
  • Based on the successful Blue Prism POC, coupled with CyberArk’s simple, easy-to-deploy credential management solution, the firm has future plans to automate a host of new jobs and scripts across the enterprise with RPA.
  • Quick time to value with simple and fast integration into the BluePrism solution.
  • Simplified and consistent privileged access security across strategic RPA projects.
  • Improved workflow and operational efficiency with security built-in.
数量效益
  • RPA adoption is expected to increase to 72 percent in the next two years.
  • Total ROI in less than 12 months.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

相关案例.

联系我们

欢迎与我们交流!
* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

感谢您的信息!
我们会很快与你取得联系。