- Advanced Configuration
- Advanced Monitoring and Alerting
- Antivirus
- App Delivery & Patching
- Application & Service Catalog
- Application Control
- Apps, Browsers, & Java Security
- Auditing Devices & Drives
- Change Auditing
- Cloud Detection and Response for M365
- Cloud Detection and Response for Public Cloud
- Data Classification
- Data Detection
- Data Filtering
- Data Tagging
- Desktop Automation & Connectivity
- Device Control
- Encryption of Full Disks
- Encryption of Removable Media
- GPO Compliance
- GPO Reductions & Transitions
- Hardware and Software Inventory for Windows
- Identity Threat Detection and Response (IDR) for Azure AD
- Inbound Email Security
- Integration Services
- Layer 2 Visualization
- Least Privilege Management
- Managed Detection and Response (MDR)
- Monitoring Logs, Servers, Virtualization and Applications
- Monitoring Platform
- Network Detection and Response (NDR)
- Network Profiles
- Outbound Email Security
- Password Manager
- Password Policy Enforcer
- Port Control
- Privileged Account Management
- Shadowing
- SNMP & Core Monitoring
- Traffic Flow Analyzer
- Windows 10 & 11 Management
Reduces attack surface by removing standing privileged accounts that can be compromized by attackers. Enables admins to efficiently accomplish their tasks while enforcing accountability. Avoids audit findings and provide solid proof that privileged activity is not creating security risks.
Features:
Emphemeral Privilege Accounts
Shrink your attack surface by eliminating standing
privilege. Instead, create on-demand accounts that have just enough
access to do the job at hand and are deleted automatically
afterward.
Access Approval and Certification
Ensure all privileged activity is legitimate and performed
by a trusted user with workflows for approving or denying requests
for privileged access and regularly certifying privileged
users’ rights.
Session Monitoring and Recording
See exactly what privileged activity is happening across
your systems, live or retrospectively, to spot policy violations, or
collect evidence during investigations.
Cleanup of Privileged Access Artifacts
Mitigate the risk of Golden Ticket and related attacks with
automatic purging of Kerberos tickets after each privileged session.
Avoid unsanctioned remote connections by automatically disabling RDP
on the server once an administrative task is
completed.
Service Account Management
Safeguard service accounts by rotating their passwords from
one place; receive an alert if the process is disrupted so you can
pause it and roll back any unwanted changes.
Zero Trust Privileged Access
Validate identities by enforcing contextual multifactor authentication (MFA) each time an admin requests a privileged session, using granular policies for specific activities and resources.
It locks down sensitive account passwords on-premises en integrates with Active Directory. It gives you full audit reports for compliance and automates privileged account discovery and password changing. It controls what admins can do with privileged accounts.
Features:
Eliminate internal and external threats
Don’t just vault IT credentials. Know exactly who has access to key systems.
- Real-time session monitoring, recording and keylogging keeps a watchful eye on IT.
- Integrate with SIEM and vulnerability scanners for heightened security.
- Enforce least privilege policies for super user accounts.
Meet compliance mandates
Improve standings with auditors and maintain compliance through password management.
- Produce full audit reports on vault activity.
- Record and monitor IT admin sessions.
- Keylogging for deeper visibility.
- HIPAA, PCI, SOX, NIST, Basel II, FIPS.
Manage Service Accounts
Never lose track of service accounts or application pools again.
- Instantly discover service accounts on the entire network.
- Rotate service account passwords without breaking dependencies.
Secure Password Vault
-
Role-based access control (Admin, User, Auditor, Custom)
-
Active Directory authentication
-
AES 256 and SSL encryption
-
Customizable Secret templates
-
HSM encryption key storage (optional)
-
Web-based access (Internet Explorer, Firefox, Safari, Chrome)
-
Desktop client (Windows, Linux, Mac)
-
Smartphone applications (iPhone, Android, and Windows)
Enhanced Security Audits &
Compliance
-
Session launcher (RDP, PuTTY, Web, SecureCRT, MS SQL, PowerShell, cmd, custom)
-
Two-factor authentication (RADIUS, soft token)
-
Session recording and monitoring
-
Custom approval workflows (Check Out, Request Access, Require Comment)
-
Full audit logs and customizable alerts
-
SIEM integration
-
Vulnerability scanning integration