Your SlideShare is downloading. ×
Hitachi ID Privileged Access Manager Brochure
Hitachi ID Privileged Access Manager Brochure
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Hitachi ID Privileged Access Manager Brochure

374

Published on

Securing Access to privileged accounts. …

Securing Access to privileged accounts.

Hitachi ID Privileged Access Manager secures administrator and service accounts by frequently randomizing passwords. Random passwords are encrypted and stored in a replicated vault. It controls and logs the access of users and applications to privileged accounts.

http://hitachi-id.com/privileged-access-manager/

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
374
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ©2013HitachiIDSystems,Inc.Allrightsreserved.Allothermarks,symbolsandtrademarksarethepropertyoftheirrespectiveowners.HitachiIDPrivilegedAccessManager hitachi-id.comEliminatestaticpasswordsByfrequentlyrandomizingpasswords,PrivilegedAccessManagerblockspasswordcrackingattacks,passwordsharingandprivilegeretention.PasswordRandomizationReliable,fault-tolerantandsecurestorageRandompasswordsarestoredinanencrypteddatabase.Replicationprotectsagainstdataloss.Amulti-masterarchitectureensureshighavailability,includingintheeventofalocaldisaster.Encrypted,ReplicatedVaultOperatingsystems,networkdevices,databasesandapplicationsPrivilegedAccessManagerincludesconnectorsforover100typesofsystemsandapplications,morethananycompetingproduct.Itcansecuretheentirenetworkwithminimalcustomization.ManyBuilt-inConnectorsEliminatemanualconfigurationofmanagedsystemsandaccountsAnauto-discoverysystemfindsandclassifiesservers,workstations,servicesandprivilegedaccounts.MachinediscoverycanbebasedonAD,LDAP,CSV,DNSoranIPportscan.Discoveredsystemsareprobedtofindlocalservices,accountsandgroups.Rulesdeterminewhichdiscoveredsystemsandaccountstomanageandwhatsecuritypolicytoattach.InfrastructureAuto-discoveryEliminatepassworddisplayRatherthandisplayingpasswords,PrivilegedAccessmanagercan:•LaunchRDP,SSHandsimilarsessionsandautomatetheloginprocess.•Temporarilyattachauthorizeduserstoprivilegedsecuritygroups.•TemporarilyaddpublickeystoSSHauthorized_keysfiles.Passwordsarerarelydisplayed,socannotbeshared,retainedorcompromised.SingleSign-ontoPrivilegedAccountsRecordadministratorsessionsforaccountabilityandforensicauditsPrivilegedAccessManagercanbeconfiguredtorecordloginsessionstoprivilegedaccounts.Thisincludesscreencapture,keylogging,copybuffercaptureandevenwebcamsnapshots.ThissystemusesActiveXanddoesnotrequireclientsoftwareinstallationoraproxyserver.ExtensiveACLsandworkflowsprotecttheprivacyofrecordedsessions.SessionRecordingManysystemadministratorsadmittowritingdownandsharingprivilegedpasswords.Staffoftenretainaccesstosensitivesystemsafterleavinganorganization.Giventime,passwordcrackingsoftwarecanguessmanystaticpasswords.Weakcontrolsoverpowerfulaccountsposeaserioussecurityrisk.SecurityThereareprivilegedpasswordsoneverysystem,includingoperatingsystems,databases,networkdevicesandapplications.Changingthesepasswordsishardtocoordinateamongeveryuserofeverypassword.CoordinationChallengesByfrequentlyrandomizingsensitivepasswords,HitachiIDPrivilegedAccessManagerpreventsunauthorizedaccessbycurrentandformerusersandeliminatesthethreatofpasswordcracking.Auditlogscreateaccountabilitytomonitoradministrativechanges.KeyBenefitsHitachiIDPrivilegedAccessManagersecuresadministratorandserviceaccountsbyfrequentlyrandomizingpasswords.Randompasswordsareencryptedandstoredinareplicatedvault.Itcontrolsandlogstheaccessofusersandapplicationstoprivilegedaccounts.Securingaccesstoprivilegedaccounts.
  • 2. ©2013HitachiIDSystems,Inc.Allrightsreserved.Allothermarks,symbolsandtrademarksarethepropertyoftheirrespectiveowners.HitachiIDPrivilegedAccessManager 2Readthisbrochureonline:Cisco,JuniperNetworkDevicesWebExConnect,GoogleApps,Salesforce.com,UltiProHR,Office365,CybershiftCloud/SaaSAPI,SSH,Webservice,Browseremulation,Telnet,TN3270,TN5250,HTTP(S),SQLinjection,LDAPattributesandcommand-lineFlexibleAgentsNetworkdevicesandVPNsviaAD,LDAP,SSHNetworkingOracleeBiz,PeopleSoft,SAPR/3,JDEandmoreApplicationz/OSwithRACF,TopSecretorACF/2;iSeries;ScriptsforVM/ESA,Unisys,Siemens,OpenVMS,TandemMainframes/MiniLinux,Solaris,AIX,HP-UXwithpasswd,shadow,TCB,Kerberos,NISorNIS+UnixOracle,Sybase,SQLServer,DB2/UDBDatabaseWindows,NetWare,Samba,NASappliancesFile/PrintWindows/ActiveDirectory,LDAP,eDirectory,NDSDirectoryIncludedConnectorsIncidentManagementIntegrationsAutomaticallycreate,updateandcloseticketson:•AxiosAssyst •BMC/RemedyARS•BMCSDE •CAUnicenter•ClarifyeFrontOffice •FrontRangeHEAT•HPServiceManager •NumaraTrack-IT!•Symantec/Altiris •TivoliServiceDesk•ServiceNow•ServiceNowAdditionalintegrationsviae-mail,ODBC,webservicesandwebformsareavailable.HitachiIDPrivilegedAccessManagerispartoftheHitachiIDManagementSuite,whichalsoincludes:PasswordManagerforself-servicemanagementofauthenticationfactorsandIdentityManagerforuserprovisioning.Formoreinformation,pleasevisit:http://hitachi-id.com/orcall:1.403.233.0740|1.877.386.0372AccountabilityandtransparencyManybuilt-inreportsanswer:•Whatcomputersareonthenetwork?•Whichsystemismanagedbywhichadministrator?•Whohasrequestedone-timeaccess?•Whosignedintothiscomputer?•WhichcomputerswereunresponsiveduringthepastNdays?ReportsDeterminewhocanconnecttoeachaccountSecurityofficerssetpolicytolinkgroupsofuserstogroupsofprivilegedaccountsandsystems.AccessControlPolicyEngineRapidemergencyresponseandworkflowflexibilityApowerfulworkflowengineallowsuserstorequestone-timeaccesstoprivilegedaccounts.Accessissubjecttopolicy--whocanask,whomustapprove.E-mailinvitesauthorizerstovisitasecurewebformandapproveorrejectrequests.WorkflowRequests,ApprovalsSeamlessintegrationwithWindowsserviceinfrastructureAutomaticallynotifiesWindowsServiceControlManager,Scheduler,IISandothercomponentsofnewpasswords.RandomizeServiceAccountPasswordsEliminatesstatic,embeddedpasswordsAnAPI,authenticatedwithauserID,aone-timepasswordandanIPsubneteliminatesstaticpasswordsembeddedinapplications.WebServicesAPISecureaccesstomobiledevicesClientsoftwareforWindowsandLinuxlaptopsallowsPrivilegedAccessManagertosecurepasswordsonmobiledevicesthatarefrequentlydisconnectedorpowereddown.LaptopSupportwithaLocalService

×