- centralised account management with advanced features;
- audit of actions of privileged employees;
- management of security settings;
- control of employee access to administrative resources;
- management of the authentication and authorisation process;
- recording sessions that were launched from an account from the list of privileged users (SSH, RDP, HTTPS).
- preventing the execution of commands from the blacklist;
- implementation of the two-hand rule (the system administrator’s access to the server is explicitly confirmed by the security administrator).
Result:
- full visibility and control of privileged users’ actions;
- reducing the window of a possible attack by working within the Just In Time (JIT) and Zero Stage Privilege (ZSP) models;
- implementation of the concepts of “least privilege” and “zero trust”.
Our partners: Wallix | FUDO
Full portfolio of managed services
Get a consultation on the Privileged Access Management:
+38 044 538 00 45;
infosec@old.octava.ua