View
Sorting
Products found: 7
BALABIT PRIVILEGED ACCESS MANAGEMENT
BeyondTrust Privileged Password Management
- Reduce attack surfaces by eliminating credential sharing
- Monitor and audit sessions for unauthorized access
- Analyze behavior to detect suspicious user, account and asset activity
CyberArk Privileged Account Security Solution
Privileged accounts represent the largest security vulnerability an organization faces today. In the hands of an external attacker or malicious insider, privileged accounts allow attackers to take full control of an organization’s IT infrastructure, disable security controls, steal confidential information, commit financial fraud and disrupt operations. Stolen, abused or misused privileged credentials are used in nearly all breaches. With this growing threat, organizations need controls put in place to proactively protect against, detect and respond to in-progress cyber attacks before they strike vital systems and compromise sensitive data. CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry’s most comprehensive Privileged Account Security Solution. Each product can be managed independently or combined for a cohesive and complete solution for operating systems, databases, applications, hypervisors, network devices, security appliances and more. The solution is designed for on-premise, hybrid cloud and OT/SCADA environments. The CyberArk Privileged Account Security Solution is based on CyberArk Shared Technology Platform™, which combines an isolated vault server, a unified policy engine, and a discovery engine to provide scalability, reliability and unmatched security for privileged accounts. Product list: Enterprise Password Vault® fully protects privileged passwords based on privileged account security policies and controls who can access which passwords when. SSH Key Manager™ secures, rotates and controls access to SSH keys in accordance with policy to prevent unauthorized access to privileged accounts. Privileged Session Manager® isolates, controls, and monitors privileged user access as well as activities for critical Unix, Linux, and Windows-based systems, databases, and virtual machines. Privileged Threat Analytics™ analyzes and alerts on previously undetectable malicious privileged user behavior enabling incident response teams to disrupt and quickly respond to an attack. Application Identity Manager™ eliminates hard-coded passwords and locally stored SSH keys from applications, service accounts and scripts with no impact on application performance. CyberArk Viewfinity enables organizations to remove local administrator privileges from business users and control applications on Windows endpoints and servers. On-Demand Privileges Manager™ allows for control and continuous monitoring of the commands super-users run based on their role and task.
CyberArk Privileged Identity Management (PIM)
CyberArk Sensitive Information Management (SIM) Solution, Privileged Account Security (PAS) Solution от Softprom by ERC
- Решение для обмена файлами между пользователями предприятия, системами и бизнес-процессами.
- Безопасное хранилище, в котором пользователи могут хранить и обмениваться личными бизнес-паролями, такие как те, которые используются для доступа к CRM-систем, HR-приложениям или систем управления расходами
- Разделение доступа для ИТ-специалистов и владельцев контента
- Гибкие вставки позволяют бесшовную интеграцию с существующими бизнес-приложениями и дополнительными средствами обеспечения безопасности, таких как решений для предотвращения фильтрации содержимого или потери данных
- Закрывающиеся журналы аудита могут быть использованы, чтобы сообщить о том, кто обращались, какую информацию и если были внесены изменения
- Встроенный FIPS 140-2 шифрования для защиты данных в состоянии покоя и в пути
- Выбор развертываания на территории или в облачных позволяет организациям выбрать тот вариант, который наилучшим образом соответствует их требованиям
- Высокая доступность и аварийное восстановление помогают организациям обеспечить надежность в сложных, корпоративных ИТ-средах
Gurucul Identity Analytics
Gurucul Identity Analytics (IdA) comprehensively manages and monitors identity-based risks and threats across an organization’s siloed environments. Using big data, Gurucul provides a holistic 360-degree view of identity, access, privileged access, and usage in the cloud, on mobile and on-premises. IdA reduces the access plane by detecting and removing access risks, access outliers, and orphan or dormant accounts. This improves an organization’s security posture by significantly decreasing the number of accounts that can be compromised or abused.
Identity Analytics delivers the data science that improves IAM and PAM, enriching existing identity management investments and accelerating deployments. IdA surpasses human capabilities by leveraging machine learning models to define, review and confirm accounts and entitlements for access. It uses dynamic risk scores and advanced analytics data as key indicators for provisioning, de-provisioning, authentication and privileged access management.
The impact of machine learning with Identity Analytics can radically reduce accounts and entitlements. Machine learning models provide 360-degree visibility for an identity, accounts and access, with the ability to compare to peer groups using baselines to determine normal and anomalous access. The objective is to clean up the access plane to enable access only where it should be provided.
Lieberman RED Suite
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.