ARCON Privileged Access Management Primary Use Case
I use the solution in my company since the product is very good.
In one of the use cases attached to the solution, I remember that an ID got locked after being unable to unlock the ID three or four times as per company policy. As per the organization's policy, if you try to run a password three or four times, it will get locked. No options are available in ARCON Privileged Access Management to unlock a locked ID.
During my training days, I used ARCON PAM as part of mandatory training. I even installed a version on my personal portal back then. Currently, I support a banking client who has implemented ARCON in their organization.
View full review »Many hackers or cyber attackers think about getting access to confidential user data of a company or other security information. ARCON Privileged Access Management protects such sensitive information and documents.
The solution monitors that no privileged users indulge in malicious code or click on malicious links. An employee who wants to share sensitive information outside the organization won't be able to share such data because of this solution. Notifications are sent by this solution to the network admin whenever a malicious activity is practiced.
Buyer's Guide
ARCON Privileged Access Management
April 2024
Learn what your peers think about ARCON Privileged Access Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.
Privileged access management (PAM) is why we use ARCON Privileged Access Management.
KR
reviewer2166330
Analyst at a manufacturing company with 10,001+ employees
We primarily use it for managing our team's devices, such as remote desktops and Linux switches.
View full review »Our primary use case is for using servers or accessing servers remotely, mostly for common users.
ARCON PAM offers two main access control use cases: dynamic and fixed. In the dynamic use case, users request access to services through the admin, who approves the request and grants access to a specific user account. In the fixed use case, generic users are validated, and the admin manages the password. Additionally, the admin can take a real-time session for any user accessing any service.
JM
reviewer1384740
Project Manager at a healthcare company with 10,001+ employees
Our company is involved in the health care sector and our primary use case of this solution is for compliance. Previously we used a system that included an Excel sheet but it would crash all the time because we have a large number of IT executives; tech related, application development and other administrators. We weren't able to receive the complete audit file that told us who was accessing and who was deleting what. It wasn't in compliance with data information security. For that reason we introduced the PAM solution and it's working extremely well. We're using it constantly on a daily basis. We are customers of ARCON and I'm a project manager.
We use it for privileged access management.
We are using it for privileged identity management. We are an ARCON partner and nowadays, in the industry, every customer is asking about a PAM product.
View full review »We are using ARCON Privileged Access Management for entire data centers.
View full review »This solution is used by system administrators that need to access critical servers. They need to log in using this product, and it then logs their activities.
View full review »PY
Praveen Yadav
Information Security Professional at a energy/utilities company with 10,001+ employees
Primary use is to control Microsoft administrators.
View full review »AP
Consulta3e37
Consultant at a financial services firm with 10,001+ employees
We have a team of people who do the administration activity for servers and databases before our kiosk came into the picture. They used to share a common user ID along with the password among each other. Now, after our kiosks came in, they login into our kiosks with their old user ID, enter the ID, and the underlying connection is a common ID, but the password, they do not know.
View full review »RG
Rajesh Gurikar
Manager, RPA at a financial services firm with 5,001-10,000 employees
We use it to access all the servers.
View full review »RY
SystemsEa521
Systems Engineer at a tech services company with 10,001+ employees
We're using it for managing the access to our devices; privileged administrative access to the devices is handled through ARCON.
View full review »AI
HeadOfIn0e84
Head of Information Security & Risk Assurance at a financial services firm with 501-1,000 employees
The primary use case is we want to control the access of the administrator.
We have a lot of the administrators in our organization who have privileged access on the infrastructure, devices, servers, and network devices. We want to control this access, and at the same time, monitor this access. We use it to control privileged access of administrators on infrastructure and security devices, then monitor them from time to time.
View full review »AK
Anumod Kaimal
Senior Officer- Information Security at a insurance company with 201-500 employees
The primary use of the solution is to give privileged access to critical resources, including monitoring and auditability.
View full review »Controlling the privileged access to all the target servers.
View full review »Used for server access management.
View full review »VS
reviewer1371597
Data Entry Specialist at a financial services firm with 1,001-5,000 employees
We prefer not to talk about our use cases for security reasons.
View full review »FH
Farhad Hussain
Senior Consultant (e-Governance) Leveraging ICT for Growth, Employment and Governance at Bangladesh Computer Council
- Multi-user, multi-OS, multi-database, and multi-hardware platforms
- Cisco, Huawei, IBM, HP, Dell, etc.
- Lots of networking equipment including F5 Networks.
SS
ITInfrasdb07
IT Infrastructure Management at a financial services firm with 51-200 employees
We use it for privileged access management for our production environment. We use it to record all of the changes that take place in our entire environment. That is the main function because there is a lot of compliance that we need to meet. It helps us meet those requirements.
View full review »Privileged access management, to protect privileged access.
View full review »Buyer's Guide
ARCON Privileged Access Management
April 2024
Learn what your peers think about ARCON Privileged Access Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.