SlideShare a Scribd company logo
© Copyright 2016. All rights reserved.
Enterprise Data Security
Iraje PIM
Six Reasons to go for Iraje PIM Version 6
Key Features of Version 6
iVOD
• Advanced text search within videos
• Live video sessions of users
iRSA
• 2 factor authentication on target devices
• Email & SMS OTP on target devices
iDLP
• Controlled file transfer access from target
device to desktop
• Selected users only can do data transfer
Key Features of Version 6
Time Restricted Access with Workflow
• User self service module for requesting access
• With time limited access
Agents for Windows
• Agents deployed on Windows server to
• Email & SMS OTP on target devices
Auto Change / Auto Sync Password
• Scheduled change password of target devices through
PIM
• Reset of device password through PIM in case of
password changed outside PIM
iVOD
 Advanced Video on Demand module that allows super admin to search
commands within videos
 Ability to search any typed command on a target device through this module
 Live video sessions can be viewed
 Live user sessions can be terminated as well
 No impact on user activity or performance while viewing live user sessions
 Search/Sort by Source IP, Session Start, Session End, Video Size, Date/Time
iRSA
 Provides additional factor authentication at the device level
 First authentication is AD to login to PIM Portal
 Second authentication is Mobile OTP/Email OTP to login to PIM Portal
 Third authentication is Mobile OTP/Email OTP to login to the device
 Helps secure critical devices in the enterprise
 Ensures only authorized user has access to the device
 Completely agentless functionality
 Out of the box functionality
iDLP
 Provides control to PIM admin to restrict file transfer between target devices
and user desktop
 Selective restriction for ensuring normal users cannot freely transfer data
from target to their desktops
 Better control on data transfer
Time Restricted Access with Workflow
 Self service module for privileged users to request for access of a particular
device through PIM
 The request can be reviewed and approved on email by PIM admins through a
maker checker process
 Time restrictions can be applied for access to target devices
 Once request is approved through email Workflow, user will get access to the
target device in PIM
Agents for Windows
 Agents are available for Windows devices which helps track direct access to
Windows devices of users bypassing PIM
 The agent sends an email alert to PIM admin for unauthorized access to
Windows devices accessed outside PIM
 The agent sends an email alert in case anyone tampers with the agent
Auto Change and Auto Sync Password
 Auto Change Password
 PIM admins can schedule the change password of target devices [RDP, SSH, Telnet]
through PIM
 The password of these devices for a particular group can be changed periodically
by PIM automatically
 Auto Sync Password
 Auto Sync ensures the password of the target device is brought back in sync with
PIM in case someone changes the password of the target device outside PIM
 Any unauthorized password reset of a target device done outside PIM can be reset
by PIM without manual intervention
 This reduces support required to reset the passwords manually and sync them in
PIM
ARE YOU GAME FOR IT?
Reach us
sales@mechsoftme.com
971524908692, 97143367725

More Related Content

What's hot

MARS User LoginLogout MIS
MARS User LoginLogout MISMARS User LoginLogout MIS
MARS User LoginLogout MIS
Ajoy Dasgupta
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
Per Larsen
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
Petr Dvorak
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
Sierraware
 
Ewug 1811 break the glass
Ewug 1811   break the glassEwug 1811   break the glass
Ewug 1811 break the glass
Per Larsen
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Sierraware
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next level
Per Larsen
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
Salesforce Admins
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Sierraware
 
CyberArk Online Training By Expert Trainer - itjobzone
CyberArk Online Training By Expert Trainer - itjobzoneCyberArk Online Training By Expert Trainer - itjobzone
CyberArk Online Training By Expert Trainer - itjobzone
ITJobZone.biz
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
Iranna Hurakadli
 
Knox Manage
Knox ManageKnox Manage
Knox Manage
Samsung Biz Mobile
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
IBM Sverige
 
Trivadis TechEvent 2017 The future of mobility Daniel von Büren
Trivadis TechEvent 2017 The future of mobility Daniel von BürenTrivadis TechEvent 2017 The future of mobility Daniel von Büren
Trivadis TechEvent 2017 The future of mobility Daniel von Büren
Trivadis
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
Hitachi ID Systems, Inc.
 
Dynamics - Administre sus usuarios, roles y perfiles en SAP
Dynamics - Administre sus usuarios, roles y perfiles en SAPDynamics - Administre sus usuarios, roles y perfiles en SAP
Dynamics - Administre sus usuarios, roles y perfiles en SAP
Tomas Martinez
 
IBM Sterling Secure Proxy
IBM Sterling Secure ProxyIBM Sterling Secure Proxy
IBM Sterling Secure Proxy
Lightwell
 
Knox Configure Sales Deck
Knox Configure Sales DeckKnox Configure Sales Deck
Knox Configure Sales Deck
Samsung Biz Mobile
 

What's hot (18)

MARS User LoginLogout MIS
MARS User LoginLogout MISMARS User LoginLogout MIS
MARS User LoginLogout MIS
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Ewug 1811 break the glass
Ewug 1811   break the glassEwug 1811   break the glass
Ewug 1811 break the glass
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next level
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
CyberArk Online Training By Expert Trainer - itjobzone
CyberArk Online Training By Expert Trainer - itjobzoneCyberArk Online Training By Expert Trainer - itjobzone
CyberArk Online Training By Expert Trainer - itjobzone
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
Knox Manage
Knox ManageKnox Manage
Knox Manage
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
 
Trivadis TechEvent 2017 The future of mobility Daniel von Büren
Trivadis TechEvent 2017 The future of mobility Daniel von BürenTrivadis TechEvent 2017 The future of mobility Daniel von Büren
Trivadis TechEvent 2017 The future of mobility Daniel von Büren
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
 
Dynamics - Administre sus usuarios, roles y perfiles en SAP
Dynamics - Administre sus usuarios, roles y perfiles en SAPDynamics - Administre sus usuarios, roles y perfiles en SAP
Dynamics - Administre sus usuarios, roles y perfiles en SAP
 
IBM Sterling Secure Proxy
IBM Sterling Secure ProxyIBM Sterling Secure Proxy
IBM Sterling Secure Proxy
 
Knox Configure Sales Deck
Knox Configure Sales DeckKnox Configure Sales Deck
Knox Configure Sales Deck
 

Similar to Iraje version 6 presentation

2-Factor Authentication for PeopleSoft
2-Factor Authentication for PeopleSoft2-Factor Authentication for PeopleSoft
2-Factor Authentication for PeopleSoft
Hendrix Bodden
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
Alberto Rivai
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products Overview
Dell
 
Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...
Nordic Infrastructure Conference
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Michael Noel
 
Supporting your remote clients with bomgar
Supporting your remote clients with bomgarSupporting your remote clients with bomgar
Supporting your remote clients with bomgar
Gary Wilhelm
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
MobileWorxs
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
MarketingArrowECS_CZ
 
Aptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric RuppAptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Inc
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
Precisely
 
SphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and SecuritySphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and Security
Yoav Crombie
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
Peter Daalmans
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
 
White Label Mobile OTT Solutions
White Label Mobile OTT SolutionsWhite Label Mobile OTT Solutions
White Label Mobile OTT Solutions
REVE Systems
 
Sami laiho - What's new in windows 8.1
Sami laiho - What's new in windows 8.1Sami laiho - What's new in windows 8.1
Sami laiho - What's new in windows 8.1
Nordic Infrastructure Conference
 
OpenAM Best Practices - Corelio Media Case Study
OpenAM Best Practices - Corelio Media Case Study OpenAM Best Practices - Corelio Media Case Study
OpenAM Best Practices - Corelio Media Case Study
ForgeRock
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
Hendrix Bodden
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - Presentation
AGATSoftware
 
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
BusinesstoVirtual
 
hikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdfhikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdf
MichelleSaver
 

Similar to Iraje version 6 presentation (20)

2-Factor Authentication for PeopleSoft
2-Factor Authentication for PeopleSoft2-Factor Authentication for PeopleSoft
2-Factor Authentication for PeopleSoft
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products Overview
 
Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
 
Supporting your remote clients with bomgar
Supporting your remote clients with bomgarSupporting your remote clients with bomgar
Supporting your remote clients with bomgar
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Aptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric RuppAptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric Rupp
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
SphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and SecuritySphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and Security
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
White Label Mobile OTT Solutions
White Label Mobile OTT SolutionsWhite Label Mobile OTT Solutions
White Label Mobile OTT Solutions
 
Sami laiho - What's new in windows 8.1
Sami laiho - What's new in windows 8.1Sami laiho - What's new in windows 8.1
Sami laiho - What's new in windows 8.1
 
OpenAM Best Practices - Corelio Media Case Study
OpenAM Best Practices - Corelio Media Case Study OpenAM Best Practices - Corelio Media Case Study
OpenAM Best Practices - Corelio Media Case Study
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - Presentation
 
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
 
hikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdfhikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdf
 

More from Mechsoft Technologies LLC

Mechsoft products services
Mechsoft  products  servicesMechsoft  products  services
Mechsoft products services
Mechsoft Technologies LLC
 
Parks & recreation infographic
Parks & recreation infographicParks & recreation infographic
Parks & recreation infographic
Mechsoft Technologies LLC
 
Managed End Point security
Managed End Point securityManaged End Point security
Managed End Point security
Mechsoft Technologies LLC
 
4 good reasons to implement a pam solution
4 good reasons to implement a pam solution4 good reasons to implement a pam solution
4 good reasons to implement a pam solution
Mechsoft Technologies LLC
 
Brite Order Management App
Brite   Order Management AppBrite   Order Management App
Brite Order Management App
Mechsoft Technologies LLC
 
Spa amangement software from Mechsoft Technologies
Spa amangement software from Mechsoft TechnologiesSpa amangement software from Mechsoft Technologies
Spa amangement software from Mechsoft Technologies
Mechsoft Technologies LLC
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
Mechsoft Technologies LLC
 
Odoo hr
Odoo hrOdoo hr
Iraje brochure v17 master
Iraje brochure v17 masterIraje brochure v17 master
Iraje brochure v17 master
Mechsoft Technologies LLC
 
Iraje brochure v17 master
Iraje brochure v17 masterIraje brochure v17 master
Iraje brochure v17 master
Mechsoft Technologies LLC
 
Synergita Presentation 2015
Synergita Presentation 2015Synergita Presentation 2015
Synergita Presentation 2015
Mechsoft Technologies LLC
 
Averpeek business proposal
Averpeek business proposalAverpeek business proposal
Averpeek business proposal
Mechsoft Technologies LLC
 
Redconic technologies company profile
Redconic technologies company profileRedconic technologies company profile
Redconic technologies company profile
Mechsoft Technologies LLC
 
7qc Tools 173
7qc Tools 1737qc Tools 173
7qc Tools 173
7qc Tools 1737qc Tools 173

More from Mechsoft Technologies LLC (15)

Mechsoft products services
Mechsoft  products  servicesMechsoft  products  services
Mechsoft products services
 
Parks & recreation infographic
Parks & recreation infographicParks & recreation infographic
Parks & recreation infographic
 
Managed End Point security
Managed End Point securityManaged End Point security
Managed End Point security
 
4 good reasons to implement a pam solution
4 good reasons to implement a pam solution4 good reasons to implement a pam solution
4 good reasons to implement a pam solution
 
Brite Order Management App
Brite   Order Management AppBrite   Order Management App
Brite Order Management App
 
Spa amangement software from Mechsoft Technologies
Spa amangement software from Mechsoft TechnologiesSpa amangement software from Mechsoft Technologies
Spa amangement software from Mechsoft Technologies
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
Odoo hr
Odoo hrOdoo hr
Odoo hr
 
Iraje brochure v17 master
Iraje brochure v17 masterIraje brochure v17 master
Iraje brochure v17 master
 
Iraje brochure v17 master
Iraje brochure v17 masterIraje brochure v17 master
Iraje brochure v17 master
 
Synergita Presentation 2015
Synergita Presentation 2015Synergita Presentation 2015
Synergita Presentation 2015
 
Averpeek business proposal
Averpeek business proposalAverpeek business proposal
Averpeek business proposal
 
Redconic technologies company profile
Redconic technologies company profileRedconic technologies company profile
Redconic technologies company profile
 
7qc Tools 173
7qc Tools 1737qc Tools 173
7qc Tools 173
 
7qc Tools 173
7qc Tools 1737qc Tools 173
7qc Tools 173
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

Iraje version 6 presentation

  • 1. © Copyright 2016. All rights reserved. Enterprise Data Security Iraje PIM
  • 2. Six Reasons to go for Iraje PIM Version 6
  • 3. Key Features of Version 6 iVOD • Advanced text search within videos • Live video sessions of users iRSA • 2 factor authentication on target devices • Email & SMS OTP on target devices iDLP • Controlled file transfer access from target device to desktop • Selected users only can do data transfer
  • 4. Key Features of Version 6 Time Restricted Access with Workflow • User self service module for requesting access • With time limited access Agents for Windows • Agents deployed on Windows server to • Email & SMS OTP on target devices Auto Change / Auto Sync Password • Scheduled change password of target devices through PIM • Reset of device password through PIM in case of password changed outside PIM
  • 5. iVOD  Advanced Video on Demand module that allows super admin to search commands within videos  Ability to search any typed command on a target device through this module  Live video sessions can be viewed  Live user sessions can be terminated as well  No impact on user activity or performance while viewing live user sessions  Search/Sort by Source IP, Session Start, Session End, Video Size, Date/Time
  • 6. iRSA  Provides additional factor authentication at the device level  First authentication is AD to login to PIM Portal  Second authentication is Mobile OTP/Email OTP to login to PIM Portal  Third authentication is Mobile OTP/Email OTP to login to the device  Helps secure critical devices in the enterprise  Ensures only authorized user has access to the device  Completely agentless functionality  Out of the box functionality
  • 7. iDLP  Provides control to PIM admin to restrict file transfer between target devices and user desktop  Selective restriction for ensuring normal users cannot freely transfer data from target to their desktops  Better control on data transfer
  • 8. Time Restricted Access with Workflow  Self service module for privileged users to request for access of a particular device through PIM  The request can be reviewed and approved on email by PIM admins through a maker checker process  Time restrictions can be applied for access to target devices  Once request is approved through email Workflow, user will get access to the target device in PIM
  • 9. Agents for Windows  Agents are available for Windows devices which helps track direct access to Windows devices of users bypassing PIM  The agent sends an email alert to PIM admin for unauthorized access to Windows devices accessed outside PIM  The agent sends an email alert in case anyone tampers with the agent
  • 10. Auto Change and Auto Sync Password  Auto Change Password  PIM admins can schedule the change password of target devices [RDP, SSH, Telnet] through PIM  The password of these devices for a particular group can be changed periodically by PIM automatically  Auto Sync Password  Auto Sync ensures the password of the target device is brought back in sync with PIM in case someone changes the password of the target device outside PIM  Any unauthorized password reset of a target device done outside PIM can be reset by PIM without manual intervention  This reduces support required to reset the passwords manually and sync them in PIM
  • 11. ARE YOU GAME FOR IT? Reach us sales@mechsoftme.com 971524908692, 97143367725