For VendorsBlog
Login
Hitachi ID Privileged Access Manager

Add to comparison

Hitachi ID Privileged Access Manager

1
Pitch
Hitachi ID Privileged Access Manager - secure access to elevated privileges, including administrator accounts and security groups.

Features of product

Проблемы Problem Solving
  • No control over data access
  • Risk of attacks by hackers
  • Risk of data loss or damage
  • Risk of lost access to data and IT systems
  • Risk or Leaks of confidential information
  • Unauthorized access to corporate IT systems and data
Ценности Business Values
  • Ensure Security and Business Continuity
  • Reduce Costs
Матрица сравнения с конкурентами Matrix of comparison with competitors
Описание

About Product

Privileged Access Manager secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster.

Privileged Access Manager grants access to authorized users, applications and services. It can integrate with every client, server, hypervisor, guest OS, database and application, on-premises or in the cloud.

As the scope of an organization's IT assets grows, it can become increasingly difficult to securely manage them:

  • There may be thousands of privileged accounts.
  • High privilege accounts need to be secured on a wide variety of platforms.
  • It is difficult to coordinate password changes and access to shared accounts.
  • Former IT staff can retain sensitive access after leaving an organization.
  • It can be difficult to trace changes back to individuals who made them.

Privileged Access Manager secures privileged access across the enterprise:

  • Discovers and classifies privileged accounts and security groups.
  • Randomizes passwords and stores them in an encrypted, replicated vault.
  • Requires strong authentication before granting access.
  • Enforces pre-authorized and one-time access policy, to grant temporary access to privileged accounts and security groups.
  • Launches login sessions automatically, through browser extensions and temporary SSH trust.
  • Eliminates static embedded and service account passwords.
  • Logs access requests and sessions, including video capture and key-logging.
Характеристики

Characteristics

Multi-factor Authentication
Password Vault
Password Management
Account Management N/A
Sessions Recording
Detailed Access Control
Audit
User Activity Monitoring
Privilege Management N/A
Threat Analytics N/A

Features of users

Роли заинтересованных сотрудников Stakeholders Roles
  • Chief Executive Officer
  • Chief Information Officer
  • Chief IT Security Officer
  • IT Security and Risk Management
Признаки применимости Company requirements
  • Internet access is available for employees
  • IT Security Department in company
Materials