See how Privileged Password Manager controls the process of granting access to privileged accounts and passwords.
Using a secure web browser, you can request access and provide approval for privileged accounts. Requests can be approved automatically or require dual or more approvals based on your organization’s policy. So whether your policies take into consideration the requestor’s identity and level of access, the time and day of the request attempt, and the specific resource requested – or all of these — you can configure Privilege Password Manager to meet your customized needs.
Automatic password changes
Supports configurable automatic password changes after each use, based on regular time intervals — or both.
Application password support
Replaces hardcoded passwords in procedures, scripts and other programs with programmatic calls. Application-password management includes the following capabilities:
Integrates with your existing directories, ticketing systems and user-authentication sources, including Active Directory and LDAP. It also fully supports two-factor authentication through One Identity’s Defender or other third-party two-factor authentication products. A robust CLI/API supports end-to-end integration with existing workflows and tools, including reviewer notification and escalation workflows.
Delivered as a secure hardened appliance to ensure that your passwords are safe. The appliance can only be accessed via a secure, role-based web interface that protects against host admin attacks, as well as database, OS or other system-level modifications. It also features an internal firewall that protects against external network-based attacks and provides additional auditing capabilities. This secure appliance-based approach takes away the concern and effort to install and secure access to the software.
Gives your organization secure, enterprise-ready access and management of shared credentials for more than 250,000 accounts simultaneously.
Secure password storage
It uses AES 256 encryption to encrypt all stored passwords. The appliance also includes full-disk encryption using BitLocker™ Drive Encryption.
Robust target support
Enables you to manage shared credentials on a wide range of target servers, applications and network devices.
Mobile device support
Allows you to configure password request, approval and retrieval via mobile devices on a per-user basis.
Take the hassle out of governing privileged users by automating the process. Easily certify and approve only the appropriate users for privileged access can request and gain access. By integrating Identity Manager with Privileged Password Manager, users can request, provision and attest to privileged and general-user access within the same console.
Italian firm GE.SI.ass is part of a unique consortium that provides IT services to two European insurance companies.
Privileged accounts are a necessity in any enterprise IT environment, since they enable administrators to manage the environment. But as news reports constantly remind us, granting privileged access increases the risk of a security breach.
This document describes the security architecture of the The Privileged Account Appliance used with Privileged Password Manager and Privilleged Session Manager
Ignoring the privileged account password vulnerability just won’t cut it anymore. Receive a roadmap to a simple and secure way to manage access.
New Whitepaper on Why PCI DSS Compliance is Impossible without Privileged Management
Effectively managing privileged accounts is becoming more and more critical as security and compliance emerge as the driving force behind most IT initiatives. Unfortunately, native tools and manual practices for privileged account management are proving to be inadequate for today's complex heterogeneous enterprise. This white paper explores the
Control and record privileged access while meeting auditing and compliance requirements
Solve security and administration issues inherent in Unix-based systems while achieving compliance
Manage two-factor authentication for storage and proprietary databases