For VendorsBlog
Login
Arcon Privileged Access Management Platform

Add to comparison

Arcon Privileged Access Management Platform

1
Pitch
ARCON Privileged Access Management is a highly effective solution that helps in managing, controlling and monitoring privileged user activities.

Features of product

Проблемы Problem Solving
  • No control over data access
  • Risk of attacks by hackers
  • Risk of data loss or damage
  • Risk of lost access to data and IT systems
  • Risk or Leaks of confidential information
  • Unauthorized access to corporate IT systems and data
Ценности Business Values
  • Ensure Security and Business Continuity
  • Reduce Costs
Матрица сравнения с конкурентами Matrix of comparison with competitors
Описание

About Product

ARCON Privileged Access Management is a highly effective solution that helps in managing, controlling and monitoring privileged user activities. The solution provides IT security team with a centralized policy framework to authorize the privileges based on role and responsibilities and provide rule-based restricted access to privileged accounts.

Privileged accounts are the gateway to confidential information. Hence, these accounts are vulnerable to breaches. These accounts are spread across the enterprise touching every aspect of IT infrastructures like operating systems, databases, applications, and network devices. Hence, malicious insiders are always on a lookout to target these accounts for gaining access to confidential information.

Key Features:

  • Authorization
  • One Admin Control
  • Virtual Grouping
  • Fine-Grained Access Control
  • Multi-factor Authentication
  • Password Vaulting
  • Workflow
  • Session Monitoring
  • Text and Video Logs
  • Privileged Elevation and Delegation Management (PEDM)
  • Single- Sign-On (SSO)
  • User onboarding
  • Auto-discovery
  • Customized Reporting
Характеристики

Characteristics

Multi-factor Authentication
Password Vault
Password Management
Account Management
Sessions Recording
Detailed Access Control
Audit
User Activity Monitoring
Privilege Management
Threat Analytics N/A

Features of users

Роли заинтересованных сотрудников Stakeholders Roles
  • Chief Executive Officer
  • Chief Information Officer
  • Chief IT Security Officer
  • IT Security and Risk Management
Признаки применимости Company requirements
  • IT Security Department in company

Work flow chart

Схема
Materials