I need to control the access to key assets of my data centre & NW, but my tools are hard to integrate and fragmented… I need a scalable, user-friendly & unified platform!" (CSIO)

Use Cases & Pain Points Addressed

This tool solves the following pain points, or greatly reduces their impact:

Organizations with important data centres struggle with risks of security breaches:
  • There are millions of data records stolen/leaked every day, including from mature, big & reputable brands.
  • Every breaches costs an average of 3,5 Mio USD; 81% of breaches are due to stolen passwords; 43% of breaches are linked to internal actors.

The following obstacles are frequent sources of problems:
  • Authorizing and tracking the activities of privileged accounts, often shared between multiple administrators.
  • Visibility and accountability on account-level, not as users.
  • Lack of policy enforcement, differentiated by user, user groups, and device groups.
  • Lack of dynamic capabilities to enforce certain policies, such as geo-fencing or multi-factor authentication over multiple channels.
  • Missing functions to query and audit sessions on any of the secured devices/machines.
  • Breach of compliance with policies and auditing requirements (e.g. logging & recording of all session).
  • Incomplete coverage (e.g. Linux, .ssh, network-based devices...).

In response, this tool handles all aspects and complexities associated to any needs and scenarios of a data centre, regardless of whether applied to real time communications systems, desktops, mobile devices and/or collaboration applications, or to connected machines in IoT scenarios.

It offers seamless multi-factor authentication (MFA) in end point access, database access management and privileged task automation on top of the conventional password vault and session manager features, all built-in.

It also supports mail approval and offline token mechanisms, and provides centralized visibility of privileged accounts, logging/recording of privileged user sessions.

Top benefits:
  • Supports an extensive access security strategy to control, monitor, secure and audit all privileged identities & activities across enterprise IT.
  • Protects enterprises from data breaches and associated costs due to stolen credentials or malicious activities..
  • Ensures compliance with data security regulations and regulations by disciplining access to critical IT assets..
  • Diminishes insider threats & neutralizes malware targeting privileged accounts.
  • Security of outsourced IT operations & context-aware policy control on NW devices.
  • Centralized mgmt. of distributed deployments (especially in case of multi-tenancy).

Key Features & Differentiators

The following features and advantages should be noted:

  • Agent-less solution: no need to install anything on devices (unlike some competitor)… no jump to other servers required.
  • Therefore, the performance is much better and scales to support tens of thousands of users and accounts, millions of devices and end-points, and billions of authentication combinations.

All-in-one compact solution & modular approach. The access security portfolio, is richer and more comprehensive than in competitor products:
  • Privileged Session Manager, Dynamic Password Controller.
  • Multi-Factor Authentication, Database Access Mgmt.
  • Privileged Task Automation (schedules tasks/WF requiring privileged access and eliminates exposure of credentials).
  • Unified Access Manager (extends Active Directory policies to NW infrastr. and controls direct access to NW elements).

All modules are pre-integrated: no need for multiple modules to be installed on multiple servers.

All features are pre-included: leveraging them is only a matter of activating the licenses – not renewed installation effort.

As a result, it has a much reduced resource consumption in comparison, and significantly increases operational efficiency:
  • Fastest to deploy in the market, i.e. has a much reduced implementation time.
  • Storage consumption: session videos are not stored in video format, but in vectoral format.
  • Running on Linux instead on Windows has an increased performance.
  • Man-in-the-middle de-correlation of sessions.

It includes functions and features not supported by other vendors:
  • Logs much more readable, searchable, indexed, for auditing & monitoring.
  • Real-time session monitoring; Supported Protocols: SSH, RDP, SFTP, TELNET, VNC, HTTP).
  • Context-aware policies, including geo-fencing and time-fencing.

Secure access to the organization’s social media accounts
Costs/Expenses: comes at a fraction of the cost of international vendor tools (List Price comparison).