View

Sorting

Products found: 2

logo
Offer a reference bonus
2.00

Privileged Session Management Suite (PSM)

Isolate, monitor and control privileged access to enterprise assets In today’s collaborative environment, organizations must support a range of end-users accessing privileged accounts including third party vendors, contractors, temporary employees and more. To mitigate external and internal risks, organizations must manage and monitor privileged account sessions without impacting the end-user experience. Detailed monitoring and recording CyberArk Privileged Session Manager, part of the CyberArk Privileged Account Security Solution, enables organizations to isolate, monitor, record and control privileged sessions on critical systems including Unix and Windows-based systems, databases and virtual machines.  The solution acts as a jump server and single access control point, prevents malware from jumping to a target system, and records keystrokes and commands for continuous monitoring.  The resulting detailed session recordings and audit logs are used to simplify compliance audits and accelerate forensics investigations. Enterprise-class scalability and security Privileged Session Manager is an agentless solution designed for maximum security including tamper-proof audit logs, enforcement of monitoring and recording, and session isolation to prevent the spread of malware.  A universal connector allows organizations to extend session management to virtually any component of the IT infrastructure. The solution is built on the CyberArk Shared Technology Platform, delivering scalability, high availability and centralized management and reporting. Real-time monitoring enables security teams to track user activity and detect suspicious events in real-time. Remote session termination enables security teams to immediately terminate suspicious privileged sessions directly from the CyberArk administrative console. Searchable detailed session audit logs and video recordings enable security teams to pinpoint the moment an incident started, understand how the incident began, and quickly assess any damage. Proxy-based, agentless architecture provides a single access control point and enforces monitoring and recording of all privileged activity. Secure proxy server creates an isolated, secure environment by separating the end user machine from the target system. Optional secure SSH server acts as the proxy for privileged Unix sessions, providing a native Unix user experience. A tamper-proof digital vault stores session recordings and audit logs to prevent users from editing their activity history. Integrations with Enterprise Password Vault and SSH Key Manager enable organizations to mask privileged credentials from users and ensure that these credentials never reach endpoints. Out-of-the-box integrations combined with a Universal Connector enable organizations to protect privileged accounts on Unix and Windows systems, network devices, databases, mainframes and virtual infrastructures with minimal deployment and operational costs. Enterprise-class scalability and reliability ensure that the solution can meet business requirements of even the largest organizations.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
3
5
logo
Offer a reference bonus
0.00

XTAM’s Hybrid Access Security Broker

With Xton Access Manager, you can securely lock your systems and secrets behind your firewall and use XTAM (with secured Active Directory logins, Approval and Time-based Workflows as well as Multi-Factor Authentication) to safely provide access to only those trusted personnel. Layered with Audit Trails, Video Recording and Notifications, you can be confident that your infrastructure will remain secure from threats. With XTAM’s Hybrid Access Security Broker you can:
  • Maintain your infrastructure safely behind your firewall
  • Ensure your employee and contractor access is secure with AD, SSO or MFA
  • Monitor, join, terminate and record access to your systems
  • Access Windows, Unix, AWS, Azure, Network Devices, Web Portals, Mainframes, Privileged and Shared
  • Accounts and Applications
  • Configure notifications when your systems are accessed
  • Continue using native SSH clients like PuTTY or SecureCRT
  • Generate and share audit logs and reports about user access and activity
  • Enable approval, time or location based workflows to limit remote access
  • Use a simple, intuitive web portal with no agent requirements
  • Retire your slow, aging VPN for a secure, modern Web Access & Management Portal
XTAM’s Hybrid Access Security Broker functions: Audit Trails and Reporting to Ensure Compliance Fully embedded auditing for all access and activity events. Understand exactly what, when and by whom your systems, computers and devices were accessed. In addition, simple integration with 3rd party SIEM systems using the syslog protocol is available. Access Controls for Cloud-based Datacenters When transitioning to a Cloud datacenter the traditional concepts involving firewall and perimeters disappear. All IP addresses are either public or shared with someone else in the boundaries of your huge datacenter. Access Broker is the way to recreate this perimeter. Simply block access to all resources from all locations and all people, but permit only XTAM to access your critical endpoints. This forces employees, contractors and vendor to use XTAM to access your cloud infrastructure which enforces security, control and auditing. Access Recording Record all remote access activity including video, keystroke and file transfers to remote computers for regulatory compliance. Alerts & Notifications Never be left in the dark again. Setup alerts and notifications to be aware when users are sharing, accessing or working with your systems. Monitor, Observe, Join or Terminate Active Sessions in Real-Time Join live sessions to observe user activity on remote computers, share knowledge, assist with troubleshooting or simply monitor user activity. Access Support includes RDP, SSH, VNC, Telnet and HTTPS Connect to remote computer and WEB endpoints using a variety of the most popular and standard protocols. Iron Clad Security A fully secure AES-256 encrypted Identity Vault maintains total control over all your accounts, secrets and records. A provided master password ensures a “break glass” operation can be performed in an emergency. Your sleep just became a lot more peaceful.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
17
11

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.