I need to control the access to key assets of my data centre, but my tools are limited, fragmented and hard to integrate…
I need a user-friendly & unified platform! (CSIO)

Use Cases & Pain Points Addressed

This tool solves the following pain points, or greatly reduces their impact:

Organizations with important data centres struggle with risks and issues of security breaches:
  • There are millions of data records stolen/leaked every day, including from mature, big & reputable brands.
  • Every breaches costs an average of 3,5 Mio USD – not to count reputational damage.
  • 81% of breaches are due to stolen passwords.
  • 43% of breaches are linked to internal actors.

It handles all aspects and complexities associated to any needs and scenarios of a data centre, regardless of whether applied to real time communications systems, desktops, mobile devices and/or collaboration applications, or to connected machines in IoT scenarios.

It provides centralized visibility of privileged accounts, logging/recording of privileged user sessions.

In particular, it addresses:
  • Regulatory compliance (e.g. GDPR, DSGVO, KVKK).
  • Risk of insider threats.
  • Malware that targets privileged accounts.
  • Security of outsourced IT operations (contractors and vendors).
  • Audit trails and on-demand reporting.

As such, the following obstacles are source of problems:
  • Authorizing and tracking the activities of privileged accounts (i.e. administrators – system, database and applications). Those have wide privileges but are anonymous and often used by different individuals. Supports also mail approval and offline token mechanism.
  • Visibility and accountability of users as individuals, not as accounts.
  • Lack of policy enforcement, differentiated by user, user groups, and device groups.
  • Lack of dynamic capabilities to enforce certain policies, such as geo-fencing or multi-factor authentication over multiple channels.
  • Missing functions to query and audit sessions on any of the secured devices/machines.

Breach of compliance with policies and auditing requirements (e.g. logging & recording of all session).

Incomplete coverage (e.g. Linux, .ssh, network-based devices...).

Key Features & Differentiators

The following features and advantages should be noted:

Architecture-level:
  • Agent-less solution: no need to install anything on devices (unlike Cyberark), and no jump to other servers required.
  • As a result, the performance is much better and scales to support tens of thousands of users and accounts, millions of devices and end-points, and billions of authentication combinations.

This tool prevents and detects breaches, maintains individual accountability and increases operational efficiency significantly, i.e. in managing credentials or delegating privileged actions.

All-in-one compact solution, with built in features such as MFA, PTA, Data access module, Cloud PAM, multitenancy, etc.

Modular approach:
  • All modules are pre-integrated: no need for multiple modules to be installed on multiple servers.
  • All features are included: leveraging them is only a matter of activating the licenses – not renewed installation effort (e.g. MFA module is already included and can be simply enabled).
  • As a result, it is the fastest to deploy in the market, i.e. has a much reduced implementation time.

It includes functions and features not supported by other vendors:
  • Logs much more readable, searchable, indexed, for auditing & monitoring.
  • Real-time session monitoring; Supported Protocols: SSH, RDP, SFTP, TELNET, VNC, HTTP).
  • Context-aware policies, including geo-fencing and/or time-fencing.

Much reduced resource consumption compared to other vendors:
  • Storage consumption: session videos are not stored in video format, but in vectoral format.
  • Running on Linux instead on Windows has an increased performance.
  • Man-in-the-middle agent-less solution does not require jump servers.

Supports a comprehensive set of protocols such as SSH, RDP, HTTP/S, SFTP, SQL, NoSQL, etc.

Supports PAMaaS operating model, i.e. offer PAM as a services to other B2B customers (multi-tenancy).

Costs/Expenses: comes at a fraction of the cost of international vendor tools (List Price comparison).

REFERENCES [PERMITTED]

GET MORE INFO ABOUT PRODUCT