ARCON Privileged Access Management Valuable Features

Manager (Systems) at a financial services firm with 10,001+ employees
Mainly the password vault. So, we have all of our generic IDs, which are present in the infrastructure, we have it securely vaulted. When we want to have access, we use ARCON only to have the access of the target devices or systems. View full review »
Head of Information Security & Risk Assurance at a financial services firm with 501-1,000 employees
The best part of this product is the administrator convenience. The portal is very user-friendly. An administrator can use it very easily. This is the most important part of any privileged or anti-management solution. If it is not user-friendly an administrator will not want to use it. It has to be very user friendly and easy to use. What is a good feature here, just insert whatever target that you want access, then click next, and you will be in the system. I would suggest this should be the most prominent feature for any of the privileged or anti-management system. What I like on this product: It is very easy, user-friendly, and an administrator can access it at any point in time without any hassle. View full review »
Prashant Maldikar
Head IT-Security at a financial services firm with 10,001+ employees
Provisioning of all administrative access through this solution. The privileged administrators are logging in to the solution using their domain ID and then getting access to the required servers based on their credentials. The administrators do not need to know the actual administrator's password. Otherwise, in an environment if you have N of servers, the administrator needs to know the ID password of each and every server. After implementation of this solution they are all stored in the password vault of this solution. So in this case, let's say one administrator is managing a hundred servers. He may not know the different passwords of the different servers. That person will log in to this solution using his domain ID and password and he will get access to the servers he is managing. This is a primary use of this particular solution. And then, after storing this administrator password in this password vault of the solution, the solution can automatically go and change the password based on the defined frequency with the defined complexity. Additionally, it is recording video records for Windows and command-line reports for others, Linux and AIX, of whatever activities being carries by that particular administrator. View full review »
Find out what your peers are saying about ARCON, CyberArk, Broadcom and others in Privileged Access Management. Updated: March 2020.
406,070 professionals have used our research since 2012.
Rajesh Gurikar
Manager, RPA at a financial services firm with 51-200 employees
In terms of automation, there are a number of cases, ARCON-related, where we are automating. It could be user-creation or services-creation inside ARCON. There are wonderful features which have really helped me a lot to automate things. Also, a helpful feature from the compliance perspective is the reporting. Suppose there is one server and I want to know what are all the types of access to it. Suppose there are some 10 users who are using that server. I can easily fetch a report showing, for example, that there are two users who have server admin access; there are three users who have read-only access; there are five users who have prompt-access. The connectivity of the user interface is really awesome. It is segregated properly. I don't know exactly how ARCON looks out of the box but ours has a little bit of customization. The user interface, overall, is really good. If I have some 20 servers in my ID, I can easily see for which servers I have read-only access, for which servers I have prompt-access, and for which servers I have server admin access. View full review »
Systems Engineer at a tech services company with 10,001+ employees
The most valuable features are the password management and the logs that are captured. We use both extensively. View full review »
Consultant at a financial services firm with 10,001+ employees
Once logged into our kiosk, I can go to 10 different servers and everything is logged. We can use this to identify which user is logged in, because the login being using to connect to servers will be a common ID, and that ID will not tell you who is the person logged in is. With this log available, we can drill down to the activities performed by the people within our kiosk. There is a great feature where in the case of Unix servers, we have our own text-based logs. In the case of Window's server, we cannot create a text-based log, so our kiosk takes the screenshot or picture of the screen when I am working. It does this every three seconds. Another feature is the password can be changed automatically. For example, if you have a 60 day password change policy, your cards will change the password on its own and keep it within the system. View full review »
Praveen Yadav
Information Security Professional at a energy/utilities company with 10,001+ employees
One important feature is the administrator access, mainly for Windows machines as well as Linux machines. It is important for us because there is accountability associated with each user ID. And the recordings are also helpful. View full review »
IT Infrastructure Management at a financial services firm with 51-200 employees
Because we are a financial institution, the compliance aspect is the most important for us. Using this ARCON product, we are able to leverage the compliance and auditing to meet the regulatory information and share it when we are required to. View full review »
Anumod Kaimal
Senior Officer- Information Security
The locks, which can be features. You can group various departments to obtain the approval records for workflows. Therefore, it creates a type of automation, and I do not have to manually do everything or configure things. Video and audio logs are there for any activities that the privileged admin carries out. View full review »
Farhad Hussain
Senior Consultant (e-Governance) Leveraging ICT for Growth, Employment and Governance at Bangladesh Computer Council
* Auto-discovery * Access control * Privilege management * Security controls * Identity discovery * Usage of privileged accounts * Time of sessions and monitoring of sessions. View full review »
Find out what your peers are saying about ARCON, CyberArk, Broadcom and others in Privileged Access Management. Updated: March 2020.
406,070 professionals have used our research since 2012.