Home » Shop » NetIQ Privileged Account Manager

NetIQ Privileged Account Manager

In Stock

Quantity:
Share
Delivery & Return
Ask a Question
Estimated Delivery:
26 November - 30 November
32 People viewing this product right now!
Guaranteed Safe Checkout Trues Badge
Get it today
Free shipping
Free shipping Free shipping on orders over $75.
30 - Day Returns
30 - Day Returns Not impressed? Get a refund. You have 30 days to break our hearts.
Dedicated Support
Dedicated Support Support from 8:30 AM to 10:00 PM everyday
Deskripsi

Features

Security

Password checkout for cloud services

Secure and share administrative credentials for cloud service providers such as AWS and OpenStack.

X11 Protocol support

Record and monitor sessions carried out within an X Session.

Secured password vaulting

Privileged Account Manager features an Enterprise Credential Vault, or an encrypted password “vault,” that provides secure storage of your system, application and database passwords.

Advanced authentication for privileged accounts

Create a layered defense for your sensitive assets and resources with multi-factor authentication, step-up authentication, and Smart-card support.

Database privileged account monitoring

Know what your privileged users are doing with the rights they have to business-critical databases.

Comprehensive privileged account management

Securely delegate privileged account authority across database, application and cloud environments.

Single sign-on to Linux and UNIX servers

Authorized users can access servers without entering additional credentials or complex commands.

Secure remote desktop proxy (RDP)

Privileged Account Manager creates a secure Remote Desktop Proxy (RDP) tunnel to the target Windows host, without exposing the administrative password to the user.

AD and LDAP authentication

Privileged Account Manager supports authentication against both Active Directory and LDAP identity stores—including NetIQ eDirectory—for accessing Windows servers.

Secure remote privileged command execution

Privileged Account Manager allows administrators to execute privileged commands on a UNIX host from a Windows desktop, without requiring users to start an SSH session from the Windows desktop.

Single configurable port

All agent traffic is encrypted and directed through a single port for easy product configuration and deployment in multi-firewall environments.

Database encryption

The Privileged Account Manager credential vault is a secure embedded database with two levels of encryption. The passwords are encrypted with AES 256 bit keys, and the database is encrypted with a separate AES 256 bit key.

Policy Management

Auto discovery of privileged accounts

Quickly identify privileged accounts across Windows, Unix, Linux, and Active Directory.

LDAP Credential Vault

Leverage existing LDAP directories, including Active Directory, as a secure credential vault.

Simplified agent deployment and management

Leverage third party software deployment solutions to easily deploy and manage agents where required.

Web-based console

Privileged Account Manager is managed via an intuitive web-based console which can be accessed throughout your intranet and extranet zones. The interface includes a command control console that enables the configuration of all privileged user management policies.

Task-based wizards and drag-and-drop interface

Privileged Account Manager stores Windows administrative passwords in a credential vault that resides within Command Control.

Windows group and policy enforcement

A GUI-based, drag-and-drop user interface greatly simplifies the rule-creation process and virtually eliminates the need for complex, manual scripting.

Reusable script and command libraries

Privileged Account Manager includes sample libraries of policy objects that can be simply dragged and dropped to build powerful, yet visually easy to understand, security rules.

Hierarchical rule structure

Rules can be visually constructed without scripting then dragged and dropped to create rule hierarchies that determine the processing order.

Intuitive failover and load balancing

Host agents can be visually configured in hierarchical domain structures that automatically determine load-balancing and failover between components.

Risk Analysis

Risk-based privileged session control

Risk-analysis tools record and play back user activity—down to the keystroke level. You define high-risk activity controls and enforce them with automatic session termination or access revocation.

Privileged analytics

Risk analysis engine examines user activity in real time and applies color-coded security risk ratings so that you can detect and address threats faster.

Real-time keystroke logging

Keystroke logs are updated in real time throughout the duration of a user’s session on any UNIX, Linux or Windows host.

UNIX, Linux and Windows session playback

Playback recorded user-session keystrokes in an intuitive interface that is indexed and highly searchable.

Auditing and Reporting

Windows auditing service

The Windows audit service enables administrators to view real-time and historical user activity performed on local or remote Windows hosts. Audited activity includes all actions performed during a privileged session.

Automatic data filtering for continuous compliance

Create pre-defined rules to pull events from your audit log files using comprehensive filters and schedules.

Automatic notifications

Users can be automatically emailed a daily summary of events awaiting approval.

Indelible audit record

All auditor activity is indelibly recorded on the event record, including the viewing of keystroke log activity, status changes and any notes recorded during the analysis.

Workflows

For events that require further analysis, a workflow process escalates events to the appropriate reviewers—either by sending an email notification or flagging the event in the compliance auditor console.

FTP auditing

Add an additional layer of security to your FTP transactions by using this replacement daemon for fully audited and authenticated FTP transactions.

Drop in UNIX/Linux shell replacement

Privileged commands can be executed on-demand with a ‘usrun’ statement or the user shell replaced to provide command authentication and/or total session auditing.

ACL restrictions

Determine which records individual auditors are allowed to view and prevent users from authorizing their own activity.

 

Ulasan (0)
Categories
Close
Home
Category
0 Wishlist
0 Cart

Login

Shopping Cart

Close

Your cart is empty.

Start Shopping

Note
Cancel
Estimate Shipping Rates
Cancel
Add a coupon code
Enter Code
Cancel
Close
NetIQ Privileged Account Manager

In Stock

Quantity:

Ask a Question

Eror: Formulir kontak tidak ditemukan.

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare