The UiPath Orchestrator, a key component of the UiPath Enterprise RPA Platform, provides centralized scheduling, management, and monitoring capabilities for all software robots. All user and robot actions are tracked with an automated full audit trail to aid in forensic analysis. The solution optimizes robot productivity by managing availability against demand and priority, and dynamically allocating robot resources. With UiPath Orchestrator, organizations can control, manage, and monitor their entire virtual workforce at scale from a single, centralized location.
CyberArk Privilege Access Manager and CyberArk Secrets Manager enable organizations to efficiently manage and secure privileged credentials used by human users and non-human identities. Organizations can use the CyberArk solutions to remove hardcoded credentials from RPA scripts and centrally store them in a secure digital vault; to automatically rotate and synchronize credentials based on policy; and to establish strong access and authorization controls for robots and humans. The solutions control privileged access to all applications within RPA workflows and processes, safeguarding privileged credentials used by robots, RPA administrators, and automation engineers.
In this session you will learn about the key benefits of the integration between UIPath and CyberArk.:
- Improve Operational Efficiency. Automatically rotate and synchronize credentials based on policy (e.g., after each use, at a regular cadence based on policy, or on-demand).
- Prevent Unauthorized Access. Store all privileged credentials in a secure, centralized CyberArk vault. Implement strong access and authorization controls for software robots, RPA administrators, and automation engineers.
- Avoid Deployment Delays. Use out-of-the-box (OOB) integrations and plug-ins to simplify and accelerate deployment. Rapidly address enterprise security requirements and policies to help accelerate getting new deployments into production.
- Simplify Compliance and Audits. Demonstrate appropriate policies and processes are in place. Show which individual software robot or human user accessed what, when, and why.