PRIVILEGED ACCESS SECURITY
1. Overarching privileged access control policies
2. Remote protocols supported: SSH, RDR HTTP(s), and various proprietary
protocols
3. Two-factor authentication for stronger protection of privileged user
accounts:
password + TOTP (password generator), smart card (PKI)
4. Universal solutions for all workstations, target servers and applications,
irrespective of their special features
5. Prohibition of access rule changes by privileged users
6. Automatic resource list import from Active Directory
PRIVILEGED SESSION MANAGEMENT
1. Real-time monitoring and active session termination
2. Multiple mechanisms for logging user activity: video and text recording of
sessions,
screenshots, keyboard input, entered commands, and file transfer
3. Event logs for tracking who logged into which resource under which account
and how
long it took to complete the session
4. Notifications sent via SMTP
5. Logs sent to SIEM via syslog
PRIVILEGED ACCOUNT MANAGEMENT
1. Administrator access without privileged password disclosure
2. User account management supported for: Active Directory, Linux/Unix,
Windows,
and DBMS (MS SQL, MySQL, PostgreSQL, Oracle DB)
3. User account management methods: searches and automatic use of accounts
for access to target resources, password history, auto-change options for
passwords
and SSH keys
4. Pass-through authentication for target servers and target apps