Privileged Access Management (PAM)

1/1

What it is

Centralized access management, with the purpose of securing, control, manage and monitor privileged access users to critical assets, and full traceability.

How it works

By configuring Access Groups, you can define the administrator users who will have permission to receive a physical access password, and the group of users who can use the remote access offered by the solution to access a target device or system. All cases may follow approval workflows and reasons provided by the requesting user.

Key Features

 
Audit, command alert and blocking.png

Secure storage of credentials and passwords

team.png

Possibility of more than one user requesting access to the same privileged account, without compromising usage traceability

Graphic dashboards with risk and threat

Integration with the Help Desk and Change Management tools to validate the reason provided by the requesting user

user groups.png

Definition of groups for access segregation based on user profiles

security-system.png

Emergency access for immediate password viewing, with reason request and alert to responsible parties if the approver is unavailable

Audit, command alert and blocking.png

Automated password change on the main technological platforms, such as network, servers, database, web applications, and security equipment

dual password.png

Dual password custody to ensure more than one presence in the access

team.png

Flexibility in the approval process for access to privileged accounts (pre-approved accesses, accesses with single or multiple approval)

ui.png

Passwords change according to predetermined time of use or after consultation

 

Benefits & capabilities

ui.png

Operational gain in the password change process

Audit, command alert and blocking.png

Guaranteed password delivery in a secure and controlled manner

security-system.png

Transparent authentication on the target system or network device without displaying the password to network administrators or third parties

Ready to have visibility of the
activities performed by specific users?