PAM SYSTEMS

Manage and monitor privileged accounts.

Trust, but verify

Privileged accounts allow high privilege access your administrators to manage your servers, systems, applications, software and data. A privileged account does not have to represent only a specific user, but can be non-human and represent a service, application, or task.

What is PAM?

Privileged Access Management
(sometimes also Privileged Account Management)
indicate a tool or system for:

Manage and secure privileged accounts.

Managing their secure use to access critical systems and data.

Monitoring the activities of users who use privileged accounts.

Risks related to priviledged accounts

  • One account or password is used for multiple systems.
  • Use of simple or default passwords.
  • Sharing login credentials (with third parties,
    to simplify administration…).
  • Storing passwords in shared files (Excel, Word…).
  • They often have unnecessarily high entitlements and do not expire.
  • Often they remain active in the infrastructure, yet they
    they’re not noticed or used.
  • Obtaining privileged data is often enabled by gaining access to a current account

We offer systems for all your needs

Password Management

  • Storing passwords in a secure (encrypted) vault.
  • Local or shared installation.
  • Browser plugins/extensions.
  • Auto-fill to web forms.
  • Check password strength and age.
  • Password generation.

Makes it easier for employees use more complex passwords and renew them.

Privileged Account Management

  • Change passwords automatically.
  • Checkout procedures.
  • Approval workflow.
  • Role-based approach.
  • Advanced auditing and reporting.
  • Integration with various systems (AD, SIEM).
  • HA, automatic backups.

More advanced privileged account data sharing and management.

Privileged Access Management

  • Direct access to systems.
  • Integration with enterprise systems (IDM, Remote Management, DevOps, API).
  • Behavioral analysis.

Secure use and management of privileged accounts.
Control privileged user access to important data and systems (targets).

EKRAN

The EKRAN tool in the information system establishes a process of continuous monitoring of activities of administrators. From the moment of deployment, the system provides a detailed indexed “video record” of sessions with metadata. This makes it easy to analyse sessions even from an hours-long session. Activity monitoring of privileged accounts is very easy to understand and fulfills one of the most important security measures in your company.

Key properties

  • Fast deployment – implementation takes only a few hours and requires no changes in procedures
  • The best tool – for recording and auditing user sessions
  • Excellent price – low cost solution
  • Unbeatable licensing policy – allows you to move licenses to monitored servers

 

logo WALLIX

WALLIX Bastion is the easiest to deploy centralized privileged access solution for recording and monitoring privileged sessions. It allows you to define security policies for access control for accounts with extended privileges. It includes the ability to enforce rules for individual users. Consists of Password management and Session management, which is stronger in this case. The optional Access Manager module unifies the access and management of multiple Bastion servers.

Key properties

  • Fast deployment – implementation takes only hours
  • Easy integration – fits seamlessly into your current environment
  • Variable deployment options – HW / Virtual Appliance / AWS / Azure
  • Unified management – central console for policy definitions and reporting
  • Proxy architecture – no need to install agents on end systems
  • Privileged account discovery – WALLIX Discovery component
  • Increase outsourced productivity – sessions are recorded and stored
  • ICS/SCADA – secure access to industrial control systems
  • Password management – Password Manager ensures password complexity and renewal

 

logo Thycotic

The Thycotic security tool reduces privileged account risks, implements least privilege policy, manages applications and securely stores shared passwords and SSL keys. Only selected users are authorized to access individual sensitive data. This tool has the best
sophisticated password management.

Key properties

  • Secure vault – privileged credentials are stored in an encrypted centralized vault
  • Account unmasking – the ability to detect all service, application and administrator accounts for complete visibility of access
  • Password and key management – the ability to display passwords or provide them for connection without displaying them,password complexity check, password rotation, heartbeat
  • Delegation of access to end systems – by role, workflow for requesting and approving access
  • Session control – proxy gateway, monitoring and recording of user sessions with intervention capability
  • Template system – for different types of privileged data, ability to edit and create custom templates