Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too.
The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five.
Being able to use a proxy server is an advantage.
It is generally easy-to-use and install.
There has been no downtime this year.
It is able to manage storage and use of personal passwords.
What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy.
100% compliant and you don't have to maintain ID management for each and every user.
The initial setup is very straightforward. It's not complex at all.
Its video recording capabilities have definitely been key for us.
The interface is very simple. It doesn't need any plug-ins, just browsers that are installed at the beginning.
We are convinced that Fudo PAM is better than competing products like WALLIX.
it's perfect to control and administer computers in our company.
The most valuable feature of this solution is that it is easy to use.
Advice From The CommunityRead answers to top Privileged Access Management questions. 474,595 professionals have gotten help from our community of experts.
See more Privileged Access Management questions »
Simone AntonaciUser at 2Five1
Kindly advise on the top 5 solutions within the industry to look at.
Oluwatosin SoyoyeUser at Union Bank PLC
Question: What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
My Bank is currently looking at PAM Solutions. Kindly advise on the top 5 solutions within the industry that can be looked at. We would like to engage from the OEM point of view to have a POC carried out before we make any commercial engagement.
Menachem D PritzkerDirector of Growth at IT Central Station
On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass. Hacked accounts included Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffett, Kim Kardashian, and Kanye West, Benjamin Netanyahu, and several high profile tech companies, including Apple and Uber. The hackers posted variation of a message asking follower to transfer thousands of dollars in Bitcoin, with the promise that double the donated amount would be returned. How could Twitter have been better prepared for this? How do you rate their response?
Paresh MakwanaDirector at a tech services company
I am a director of a small tech services company. How do you think AI and ML will help or work with Privileged Identity Management (PIM) and Privileged Access Management (PAM)?
What is Privileged Access Management?
Privileged Access Management (PAM) oversees requirements of critical, private accounts living in an enterprise’s IT infrastructure. It is alternatively called Privileged Identity Management (PIM), Privileged Account Management or Privileged Session Management – collectively known as PxM. A privileged user is a person who can access the administrative backend of a critical system, delete data or change settings. PAM is essential to strong security.
The Privileged Access Management process is normally used as a tool for information security, and IT Central Station users look for richness in the functionality provided for oversight. Enterprises must prevent unauthorized backend system access while always adhering to compliance. Privileged Access Management safeguards aggressive data breaches and is intended to protect confidential data from the efforts of bad actors. PAM is constantly being updated to protect the security of the enterprise IT Central Station users are responsible for controlling shared frameworks and monitor authorized user access along with interim levels of permissions for privileged access within an enterprise.
IT and DevOps teams look for a number of categories necessary for Privileged Access Management, sometimes referred to as a “PAM Solution.” Requirements include life cycle and provisioning management, authorization, authentication, password management, access controls and auditing. Operating system components such as routers, switches, and firewalls all come into question with Privileged Access Management.
Functionality must meet risk management and compliance parameters. The goal is to protect, control and monitor operating systems, applications and the database. This can be achieved in part through session recording and session isolation to prevent unauthorized access, always a concern whether IT is talking about on-premises or cloud solution.
IT professionals are looking for easy to use GUI, availability of OOTB integration functionalities with other systems and availability of OOTB connectors to manage password and sessions of devices. High availability / failover to DR environment with no data loss should be provided and scalable components are key. Time is always a factor, so having the agility and ability to establish and manage simultaneous operating sessions to target devices is ideal. Ultimately, speed, coverage and security are the best ways to keep out the bad guys.