I need to control the access to key assets of my data centre, but my tools are limited, fragmented and hard to integrate…
I need a user-friendly & unified platform! (CSIO)
Type: Product
"Protect What You Connect": a cyber security tool to efficiently manage, monitor secure access to any platform, device, or network element through a single & centralized platform.
It supports organizations in securing their critical assets and assists in achieving regulatory compliance requirements.
(Data centre security: PAM, MFA, SSO, time/geo fencing, session mgmt. and monitoring, dynamic password controller, TACACS+ and Radius, etc.)
It supports organizations in securing their critical assets and assists in achieving regulatory compliance requirements.
(Data centre security: PAM, MFA, SSO, time/geo fencing, session mgmt. and monitoring, dynamic password controller, TACACS+ and Radius, etc.)
Service Mgmt. & Support
Hotline (English):
- 24/7.
- Remote support provided via ticketing system.
- Email groups are available to post questions (counts as a ticket).
- SLA defined for critical/major/minor issues.
- No additional difference for bronze/silver/gold service levels.
Competitor Product
Cyberark
Beyondtrust
Thycotic
Beyondtrust
Thycotic
Use Cases & Pain Points Addressed
This tool solves the following pain points, or greatly reduces their impact:
Organizations with important data centres struggle with risks and issues of security breaches:
It handles all aspects and complexities associated to any needs and scenarios of a data centre, regardless of whether applied to real time communications systems, desktops, mobile devices and/or collaboration applications, or to connected machines in IoT scenarios.
It provides centralized visibility of privileged accounts, logging/recording of privileged user sessions.
In particular, it addresses:
As such, the following obstacles are source of problems:
Breach of compliance with policies and auditing requirements (e.g. logging & recording of all session).
Incomplete coverage (e.g. Linux, .ssh, network-based devices...).
Organizations with important data centres struggle with risks and issues of security breaches:
- There are millions of data records stolen/leaked every day, including from mature, big & reputable brands.
- Every breaches costs an average of 3,5 Mio USD – not to count reputational damage.
- 81% of breaches are due to stolen passwords.
- 43% of breaches are linked to internal actors.
It handles all aspects and complexities associated to any needs and scenarios of a data centre, regardless of whether applied to real time communications systems, desktops, mobile devices and/or collaboration applications, or to connected machines in IoT scenarios.
It provides centralized visibility of privileged accounts, logging/recording of privileged user sessions.
In particular, it addresses:
- Regulatory compliance (e.g. GDPR, DSGVO, KVKK).
- Risk of insider threats.
- Malware that targets privileged accounts.
- Security of outsourced IT operations (contractors and vendors).
- Audit trails and on-demand reporting.
As such, the following obstacles are source of problems:
- Authorizing and tracking the activities of privileged accounts (i.e. administrators – system, database and applications). Those have wide privileges but are anonymous and often used by different individuals. Supports also mail approval and offline token mechanism.
- Visibility and accountability of users as individuals, not as accounts.
- Lack of policy enforcement, differentiated by user, user groups, and device groups.
- Lack of dynamic capabilities to enforce certain policies, such as geo-fencing or multi-factor authentication over multiple channels.
- Missing functions to query and audit sessions on any of the secured devices/machines.
Breach of compliance with policies and auditing requirements (e.g. logging & recording of all session).
Incomplete coverage (e.g. Linux, .ssh, network-based devices...).
Key Features & Differentiators
The following features and advantages should be noted:
Architecture-level:
This tool prevents and detects breaches, maintains individual accountability and increases operational efficiency significantly, i.e. in managing credentials or delegating privileged actions.
All-in-one compact solution, with built in features such as MFA, PTA, Data access module, Cloud PAM, multitenancy, etc.
Modular approach:
It includes functions and features not supported by other vendors:
Much reduced resource consumption compared to other vendors:
Supports a comprehensive set of protocols such as SSH, RDP, HTTP/S, SFTP, SQL, NoSQL, etc.
Supports PAMaaS operating model, i.e. offer PAM as a services to other B2B customers (multi-tenancy).
Costs/Expenses: comes at a fraction of the cost of international vendor tools (List Price comparison).
Architecture-level:
- Agent-less solution: no need to install anything on devices (unlike Cyberark), and no jump to other servers required.
- As a result, the performance is much better and scales to support tens of thousands of users and accounts, millions of devices and end-points, and billions of authentication combinations.
This tool prevents and detects breaches, maintains individual accountability and increases operational efficiency significantly, i.e. in managing credentials or delegating privileged actions.
All-in-one compact solution, with built in features such as MFA, PTA, Data access module, Cloud PAM, multitenancy, etc.
Modular approach:
- All modules are pre-integrated: no need for multiple modules to be installed on multiple servers.
- All features are included: leveraging them is only a matter of activating the licenses – not renewed installation effort (e.g. MFA module is already included and can be simply enabled).
- As a result, it is the fastest to deploy in the market, i.e. has a much reduced implementation time.
It includes functions and features not supported by other vendors:
- Logs much more readable, searchable, indexed, for auditing & monitoring.
- Real-time session monitoring; Supported Protocols: SSH, RDP, SFTP, TELNET, VNC, HTTP).
- Context-aware policies, including geo-fencing and/or time-fencing.
Much reduced resource consumption compared to other vendors:
- Storage consumption: session videos are not stored in video format, but in vectoral format.
- Running on Linux instead on Windows has an increased performance.
- Man-in-the-middle agent-less solution does not require jump servers.
Supports a comprehensive set of protocols such as SSH, RDP, HTTP/S, SFTP, SQL, NoSQL, etc.
Supports PAMaaS operating model, i.e. offer PAM as a services to other B2B customers (multi-tenancy).
Costs/Expenses: comes at a fraction of the cost of international vendor tools (List Price comparison).