Moreover, the organization now controls, manages and logs the use of all privileged user credentials with the CyberArk solution. Looking ahead, the company plans to leverage CyberArk’s privileged account security solution to enforce other highly relevant mitigation steps, including