About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

  • Platform delivers the industry's most comprehensive protection for all non-human identities that matter
  • Combines the application of unique and universal identities to all workloads with secrets management, reducing machine identity complexity and risk
  • New discovery capabilities to provide contextual understanding of workload identity risk

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced the availability of CyberArk Secure Workload Access Solution,1 delivering the industry's most comprehensive protection for all non-human identities that matter. The solution will enable security teams to gain visibility and control over the entire machine identity lifecycle, from creation and governance to automated rotation and renewal.

Machine identities proliferate in cloud-native architectures, including applications, workloads, and automated processes. Unlike solutions focusing on singular machine identity types, CyberArk's layered approach will enable organizations to enforce least privilege, mitigate risk, and prevent credential-based attacks for all workloads across hybrid and multi-cloud environments.

In addition, CyberArk has extended its discovery and context capabilities, designed to help security teams take the first steps to modernize workload authentication by assessing, understanding and eliminating risks tied to unprotected machine identities. These automated capabilities help teams generate an inventory of secrets, certificates and information about their environment, understand the risk of compromise tied to each machine identity and prioritize mitigation actions.

"Modern, cloud and ephemeral workloads mean authentication can be fragmented, making access control challenging and resulting in a large, unprotected attack surface that dramatically increases the risk of breaches," said Kurt Sand, GM of Machine Identity Security at CyberArk. "Recent high-profile attacks have highlighted the urgent need for a modern, identity-first model that enforces universal and unique workload identities to help organizations confidently secure workloads across their entire hybrid and multi-cloud estate."

The core of the Secure Workload Access Solution is CyberArk Workload Identity Manager. This lightweight, distributed, and cloud-native machine identity issuer goes beyond traditional Public Key Infrastructure (PKI) systems that cannot scale to the needs of ephemeral cloud workloads. The new solution will integrate Workload Identity Manager with CyberArk Secrets Manager, enabling secure access for all workloads as cloud-native and containerized environments grow.

The CyberArk Secure Workload Access Solution will allow workloads running in virtualized environments to be automatically identified for access to cloud services and cloud provider environments, securing dynamic, cloud-native workloads like Kubernetes and service mesh. It will provide the capability to:

  • Securely connect on-premises and cloud workloads across environments with unique and universal SPIFFE2 identities that work with existing identities, applications, clouds and SaaS services.
  • Integrate seamlessly with secrets management for existing API key and access token authentication, as well as other secrets.
  • Discover and assess risk across all workloads, making it easier to detect threats, enforce security policies and prevent unauthorized access.

Further information:

1The CyberArk Secure Workload Access Solution is currently in early availability. An early availability program enables select customers to access technologies before they become generally available.

2Secure Production Identity Framework For Everyone (SPIFFE).

About CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in identity security, trusted by organizations around the world to secure human and machine identities in the modern enterprise. CyberArk's AI-powered Identity Security Platform applies intelligent privilege controls to every identity with continuous threat prevention, detection and response across the identity lifecycle. With CyberArk, organizations can reduce operational and security risks by enabling zero trust and least privilege with complete visibility, empowering all users and identities, including workforce, IT, developers and machines, to securely access any resource, located anywhere, from everywhere. Learn more at cyberark.com.

Copyright © 2025 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

Unlike solutions focusing on singular machine identity types, CyberArk's layered approach will enable organizations to enforce least privilege, mitigate risk, and prevent credential-based attacks for all workloads across hybrid and multi-cloud environments

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.