SECURITY & COMPLIANCE / ONEIDENTITY SAFEGUARD (PAM)
ONEIDENTITY SAFEGUARD (PAM)
Securely store, manage, record and analyse privileged access
Hackers want access to your privileged accounts, which provide unlimited access to your systems and data. In nearly every recent high-profile breach, lapses in security and user practices were exploited by hackers to get their hands on privileged account credentials.
To prevent a breach and to limit the damage if one does occur, you need to have a privileged access management program that enables best practices so that your organisation has a secure, efficient and compliant way to provide access and monitor privileged accounts.
One Identity Safeguard can reduce the stress and worry with your privileged accounts. This innovative privileged access management solution – available as an easily deployed, hardened appliance – gives your organisation a secure way to store, manage, record and analyse privileged access. It is an integrated solution that combines a secured and hardened password safe, and a session-management and -monitoring solution with threat detection and analytics. Safeguard detects and shuts down threats while satisfying your auditors and admins.
Quickly discover privileged accounts or systems on your network with host-, directory- and network-discovery options.
Privileged accounts are stored in a hardened physical or virtual appliance, which helps to enhance security and speed installation and ongoing management.
Record all session activity – down to the keystroke, mouse movement and windows viewed.
Traffic is monitored in real time either by humans or machines, so that appropriate actions can be executed automatically if a certain actions appear in the command line or on screen.
All activity is captured, indexed and stored in encrypted, time-stamped and cryptographically signed files for forensics and compliance purposes.
Activity can be viewed like a video and searched like a database. Search for specific events across sessions and watch the recording beginning from the exact location that the event occurred.
Uncover previously unknown threats from inside and outside of your organisation by using user-behaviour analytics technology.
One Identity Safeguard for Privileged Passwords
Safeguard for Privileged Passwords automates, controls and secures the process of granting privileged credentials with role-based access management and automated workflows. The user-centred design of Safeguard for Privileged Passwords means a reduced learning curve. Plus, the solution enables you to manage passwords from anywhere and using nearly any device. The result is a solution that secures your enterprise and gives your privileged users a new level of freedom and functionality.
Quick Discovery and onboarding of assets
Automated workflow engine
Approve passwords from anywhere
Full REST API
Free personal password vault for business users
Safeguard for Privileged Sessions
Safeguard for Privileged Sessions enables you to control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. Content of the recorded sessions is indexed to make searching for events and automatic reporting simple so you can easily meet your auditing and compliance requirements. In addition, Safeguard for Privileged Sessions serves as a proxy, and inspects the protocol traffic on the application level and can reject any traffic that violates the protocol – thus it is an effective shield against attacks.
Full session audit, recording and replay
Real-time alerting and blocking
Initiate workflows or deploy in transparent mode with no changes to users
Full text search including Optical Character Recognition
Safeguard for Privileged Analytics
Safeguard for Privileged Analytics monitors questionable behaviours and uncovers previously unknown threats from inside and outside of your organisation. By using user behaviour analytics technology, Safeguard for Privileged Analytics detects anomalies and ranks them based on risk so you can prioritise and take appropriate action — and ultimately prevent data breaches.
Pattern-free analysis to detect unknown bad behaviours
Full content analyzation, including screen content, issued commands and windows titles
Use keystroke dynamics and mouse movement analysis to help identify breaches
Reduce alert noise by categorising alerts by risk and deviation levels