Panasonic Information Systems Co., Ltd. has started using the CyberArk Identity Security Platform to improve the security of its servers across the entire Panasonic Group. This is part of its digital transformation efforts. The new system helps manage and control who has special access (called “privileged access”) to important systems. It also makes sure that only the right people have the right level of access, automatically and securely.
The Panasonic Group is a large Japanese company that makes electronics, home appliances, automotive parts, and more. Panasonic Information Systems manages IT for the group, including its systems for retail, manufacturing, and distribution.
Before this upgrade, the company was using a manual process to manage access to thousands of Windows and Linux servers. Server administrators were also handling extra tasks like inventory checks and responding to system-related requests, which caused delays and inefficiencies. Their old tools didn’t give a clear view of who was accessing what or whether access was properly approved.
“Threat actors today continue to develop new identity-centric attacks, necessitating a shift in how privileged access is secured. CyberArk has equipped Panasonic Information Systems with the ability to secure privileged access for all identities, in any environment, from anywhere, increasing cyber resilience and allowing for greater operational efficiencies,” said Mitsuro Kakizawa, Regional Director, Japan at CyberArk.
“We’re proud to welcome Panasonic Information Systems to our customer community. In today’s modern enterprise, any identity can become privileged at any moment, making it essential to have strong identity security controls in place. That’s why leading organizations trust CyberArk to protect their most critical assets,” said Matt Cohen, Chief Executive Officer of CyberArk.
As part of the Panasonic Transformation (PX) initiative, the company decided to improve security and make its processes more efficient.
With CyberArk Privileged Access Manager, access to servers is now handled in a centralized and automated way. The system keeps detailed records of who accessed which servers, when, and what actions they performed. This helps with audits and investigating any problems. Passwords and login details are hidden from users and are automatically given out and changed by the system, making it much harder for them to be stolen or misused.