<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://cyberark.hubs.vidyard.com/watch/6CNUwZQgPQ62aF2vsdrSe6</loc><video:video><video:title>C³ Alliance: RSA, The Security Division of EMC &amp; CyberArk</video:title><video:description><![CDATA[Jim Ducharme, Vice President of IAM Products, RSA, The Security Division of EMC, comments on how the integration of RSA Security Analytics and RSA® Via Lifecycle and Governance (RSA Via L&G) Solutions with CyberArk Privileged Account Security helps mutual customers to address a range of privileged security needs within real time security monitoring, identity and access governance and multi-factor authentication. RSA is a member of the C³ Alliance, CyberArk’s Global Technology Partner Program.]]></video:description><video:thumbnail_loc>https://cdn.vidyard.com/thumbnails/288758/Ry18LCrz0o5EEWSUuJmA5A.jpg</video:thumbnail_loc><video:player_loc allow_embed="yes">https://www.youtube.com/watch?v=79sH_2KdxZk&amp;amp;feature=youtube_gdata_player</video:player_loc><video:content_loc>https://youtube.googleapis.com/v/79sH_2KdxZk</video:content_loc><video:duration>86</video:duration></video:video></url><url><loc>https://cyberark.hubs.vidyard.com/watch/deP5regaes73w4JjafgBiS</loc><video:video><video:title>Securing the Cloud with CyberArk</video:title><video:description><![CDATA[Watch this 60-second video to learn how CyberArk Privileged Account Security can secure cloud environments including Infrastructure-as-a-Service and Software-as-a-Service. Unique capabilities of the solution include credential protection, session security and continuous monitoring to deliver a layered approach to securing privileged accounts in the cloud.]]></video:description><video:thumbnail_loc>https://cdn.vidyard.com/thumbnails/288761/_d3IYQkwhlURjBUBnFbPoQ.jpg</video:thumbnail_loc><video:player_loc allow_embed="yes">https://www.youtube.com/watch?v=stzXRHrVUhA&amp;amp;feature=youtube_gdata_player</video:player_loc><video:content_loc>https://youtube.googleapis.com/v/stzXRHrVUhA</video:content_loc><video:duration>66</video:duration></video:video></url><url><loc>https://cyberark.hubs.vidyard.com/watch/fPs84xc7w7CbzBrQyW2jAq</loc><video:video><video:title>CyberArk Brief: How to address common security risks in Industrial Control Systems (ICS)</video:title><video:description><![CDATA[Recommendations on how to address common risks associated with the convergence of IT and OT environments and the misuse of privileged credentials in industrial control systems.]]></video:description><video:thumbnail_loc>https://cdn.vidyard.com/thumbnails/288847/cIOMskpjGlFK-qaCet0sxg.jpg</video:thumbnail_loc><video:player_loc allow_embed="yes">https://www.youtube.com/watch?v=y1wfbfHOzCM&amp;amp;feature=youtube_gdata_player</video:player_loc><video:content_loc>https://youtube.googleapis.com/v/y1wfbfHOzCM</video:content_loc><video:duration>214</video:duration></video:video></url><url><loc>https://cyberark.hubs.vidyard.com/watch/sk7j2stgNmxFrYgWWqY9DT</loc><video:video><video:title>C³ Alliance: Rapid7 &amp; CyberArk</video:title><video:description><![CDATA[John Schimelpfenig, Sr. Business Development Manager, Rapid7, comments on the benefits of credentialed-protected scanning.  Via the technology integration with CyberArk Application Identity Manager™, Rapid7 Nexpose® can provide secured scanning as well as trusted results by extracting the credentials that are necessary via CyberArk Application Identity Manager. Rapid7 is a member of the C³ Alliance, CyberArk’s Global Technology Partner Program.]]></video:description><video:thumbnail_loc>https://cdn.vidyard.com/thumbnails/288759/lljzE24mxLVOvb8CfMPhdw.jpg</video:thumbnail_loc><video:player_loc allow_embed="yes">https://www.youtube.com/watch?v=qOQqsyvG62g&amp;amp;feature=youtube_gdata_player</video:player_loc><video:content_loc>https://youtube.googleapis.com/v/qOQqsyvG62g</video:content_loc><video:duration>114</video:duration></video:video></url><url><loc>https://cyberark.hubs.vidyard.com/watch/tkoxzfur6sigi23V76KRbp</loc><video:video><video:title>C³ Alliance -- CyberArk’s Global Technology Partner Program</video:title><video:description><![CDATA[The C³ Alliance delivers certified technology integrations between CyberArk and alliance member products that make it easier for customers to extend the power of privileged account security across their organization and enhance their overall security posture. C³ Alliance members represent enterprise software, infrastructure and security solutions, including security information and event management (SIEM), identity and access governance, asset and vulnerability discovery, security management and authentication services that benefit from tighter integration with CyberArk for securing privileged accounts and using privileged data to detect and respond to threats.

CyberArk’s Adam Bosnian, EVP of Global Business Development and Joanne Wu, Director of Business Development give an overview of the program in this short video.]]></video:description><video:thumbnail_loc>https://cdn.vidyard.com/thumbnails/288756/f2_jW7-k8w-s_X4sbt0Utw.jpg</video:thumbnail_loc><video:player_loc allow_embed="yes">https://www.youtube.com/watch?v=TIzTIjIPmG4&amp;amp;feature=youtube_gdata_player</video:player_loc><video:content_loc>https://youtube.googleapis.com/v/TIzTIjIPmG4</video:content_loc><video:duration>143</video:duration></video:video></url><url><loc>https://cyberark.hubs.vidyard.com/watch/vUHFFSMAN4QAkCmwYw2hnk</loc><video:video><video:title>CyberArk Brief: How to effectively manage local admin rights on endpoints.</video:title><video:description><![CDATA[Recommendations to effectively manage local admin rights on endpoints. Learn how to strengthen security and reduce the attack surface without disrupting the authorized day-to-day tasks of business users.]]></video:description><video:thumbnail_loc>https://cdn.vidyard.com/thumbnails/288850/KMvEdiKTqPxCtx7Slc8Now.jpg</video:thumbnail_loc><video:player_loc allow_embed="yes">https://www.youtube.com/watch?v=UHJNqviB-F8&amp;amp;feature=youtube_gdata_player</video:player_loc><video:content_loc>https://youtube.googleapis.com/v/UHJNqviB-F8</video:content_loc><video:duration>182</video:duration></video:video></url><url><loc>https://cyberark.hubs.vidyard.com/watch/yN2pgRTeDqmKMxFvmAVWeF</loc><video:video><video:title>CyberArk Brief: The role of privileged accounts in the cyber attack lifecycle.</video:title><video:description><![CDATA[The role of privileged accounts in the cyber attack lifecycle.  Learn about the common path attackers take from initial compromise to mission accomplished.]]></video:description><video:thumbnail_loc>https://cdn.vidyard.com/thumbnails/288849/MXzyJHXInN-vZjDTbpgpcg.jpg</video:thumbnail_loc><video:player_loc allow_embed="yes">https://www.youtube.com/watch?v=u5UhEF0w9pI&amp;amp;feature=youtube_gdata_player</video:player_loc><video:content_loc>https://youtube.googleapis.com/v/u5UhEF0w9pI</video:content_loc><video:duration>165</video:duration></video:video></url><url><loc>https://cyberark.hubs.vidyard.com/watch/z1ryAWe1Q6BDXmVLVRe9u5</loc><video:video><video:title>What is the market opportunity for Channel Partners?</video:title><video:description><![CDATA[What is the market opportunity for Channel Partners? John Worrall, CMO, CyberArk. A short interview with our CMO discussing the privileged account security space and the revenue opportunity for our partners who invest with us.]]></video:description><video:thumbnail_loc>https://cdn.vidyard.com/thumbnails/288853/2HJkUsArY6oJC3jtoRZirw.jpg</video:thumbnail_loc><video:player_loc allow_embed="yes">https://www.youtube.com/watch?v=BDifxrVkuhA&amp;amp;feature=youtube_gdata_player</video:player_loc><video:content_loc>https://youtube.googleapis.com/v/BDifxrVkuhA</video:content_loc><video:duration>220</video:duration></video:video></url><url><loc>https://cyberark.hubs.vidyard.com/</loc></url><url><loc>https://cyberark.hubs.vidyard.com/categories/c3-alliance</loc></url><url><loc>https://cyberark.hubs.vidyard.com/categories/cyberark-whiteboard-videos</loc></url></urlset>