News

Adapting to NIS2, DORA, and PCI DSS with CyberArk Identity Security Solutions

News | 21.01.2026

The landscape of cyber threats and regulatory requirements is undergoing fundamental changes. Traditional perimeter-based security approaches are no longer effective in a world of hybrid clouds and remote work. Today, identity is becoming the new line of defense, and Privileged Access Management (PAM) is transforming from a technical function into a strategic element of regulatory compliance.

The new reality of regulatory requirements

Modern standards, such as NIS2, DORA, PCI DSS v4.0, and new NIST directives, shift the focus from formally "having security measures" to demonstrating their effectiveness. Regulators require not just periodic checks, but continuous access control for all types of identities — both human and machine.

Compliance is no longer a tick-box exercise. It is a continuous process of ensuring the security of every identity.

The evolution of privilege management

The concept of a "privileged user" has expanded. While it used to concern only system administrators, today privileged access is required by developers, cloud services, and even RPA bots. Below we examine how the approach to security is changing.

Traditional approach (Legacy PAM)

  • Focus: Protection of administrators and servers.
  • Frequency: Quarterly access audits.
  • Principle: Trust within the network perimeter.
  • Management: Manual processes and static passwords.

Modern approach (Intelligent Privilege Controls)

  • Focus: Protection of all identities (human and machine).
  • Frequency: Continuous monitoring and "Just-in-Time" access.
  • Principle: Zero Trust — never trust, always verify.
  • Management: Policy automation and dynamic secrets.

Why CyberArk?

The CyberArk Identity Security platform allows organizations to not only meet strict regulatory requirements but also significantly reduce the risk of breaches. The solution provides centralized access rights management, session recording, and real-time threat analytics.

As an official distributor, Softprom possesses deep expertise in implementing CyberArk solutions. We help adapt the vendor's tools to the specifics of your infrastructure and local legal requirements.

Learn more about the vendor's solutions on our website: CyberArk Page.

More about our company: About Softprom.