Privileged Access Management Software
Use Capterra.com.br in Brazil to find the best Privileged Access Management Software for your business.
BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against threats. Our platform unifies the most effective technologies for addressing internal and external risk: Privileged Account Management and Vulnerability Management.
System Frontier enables organizations to easily delegate granular permissions to Tier 1 support staff, junior administrators, contractors and vendors without giving away admin rights. Every action is audited, including the output from command-line tools. Integrate with other IT support applications in multiple ways to support your workflow. Manage servers, workstations, network devices, Active Directory objects or anything that supports remote API connections.
by CyberArk Software
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Centrify Infrastructure Services minimize the attack surface. How does this work? Identity Broker, secures access & authentication to geographically dispersed infrastructure (on-premises & private/public cloud). Adaptive/Risk-based MFA is used for remote access to Windows & Linux servers and elevating or leveraging privileged credentials. Privilege Access & Elevation automates fulfilling of requests for specific roles, while revoking entitlements upon expiration. Other capabilities: SAPM, Aud...
EventLog Analyzer is the most cost-effective Security Information and Event Management (SIEM) solution available in the market. EventLog Analyzer meets all critical SIEM capabilities such as log aggregation, log analysis, compliance reporting, file integrity monitoring, user activity monitoring, event correlation, real-time alerting, log forensics and log retention. Now you can mitigate sophisticated cyber-attacks, identify the root cause of security incidents and thwart data breaches.
by Xton Technologies
XTAM is a privileged account management software which includes Web based password vault with password rotation, discovery, workflow controlled access, high trust login, session and keystroke recording with instant playback, full audit trail, elevated script automation, alerting and extensive analytics. XTAM integrates with AD/LDAP, SIEM, multi factor authentication providers and ticketing systems. XTAM is an agentless, scalable solution for on premises, hybrid and cloud deployments.
by VaultOne Software
Stop Unrestricted Use of Privileged Information Vault One reduces the attack surface of a threat by providing session access to servers without disclosing password material. These sessions are recorded for later forensics and audit, allowing you to track the source of a breach. Access to shared accounts can be contingent on additional workflow approvals and/or high-trust MFA.
by Lieberman Software
Lieberman RED (Rapid Enterprise Defense) Identity Management is a privileged account management platform that automatically discovers and manages cross-platform privileged accounts at scale throughout the enterprise. Lieberman RED Identity Management secures access to systems, devices, applications and databases. Proactively mitigate cyber threats that bypass traditional enterprise defenses by delivering automated intrusion remediation in real-time.
by Hitachi ID Systems
Enhance security of your privileged accounts across the entire enterprise with strong authentication, session recording, and password randomization capabilities.
Privileged account access control and monitoring solution that provides encrypted password vaulting, full visibility into privileged user activity, and risk analysis tools.
On Ease.space, the company's tools are grouped by usage (marketing, development, design, acquisition, administration, HR ...) and shared easily. Ease.space helps to keep real-time visibility and control over who has access to what tools. A person joining the team gets access to the tools shared and knows which nominative accounts she needs to create. While leaving the team revokes accesses. Each password stored is always synchronized between team members allowed to have it.