We just raised a $30M Series A: Read our story
2018-06-24T08:17:00Z

What is your primary use case for ARCON Privileged Access Management?

2

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
1010 Answers

author avatar
Top 10Real User

Our company is involved in the health care sector and our primary use case of this solution is for compliance. Previously we used a system that included an Excel sheet but it would crash all the time because we have a large number of IT executives; tech related, application development and other administrators. We weren't able to receive the complete audit file that told us who was accessing and who was deleting what. It wasn't in compliance with data information security. For that reason we introduced the PAM solution and it's working extremely well. We're using it constantly on a daily basis. We are customers of ARCON and I'm a project manager.

2020-07-26T08:19:19Z
author avatar
Top 20Real User

We prefer not to talk about our use cases for security reasons.

2020-06-17T10:56:05Z
author avatar
Real User

* Multi-user, multi-OS, multi-database, and multi-hardware platforms * Cisco, Huawei, IBM, HP, Dell, etc. * Lots of networking equipment including F5 Networks.

2019-04-03T07:18:00Z
author avatar
Real User

We're using it for managing the access to our devices; privileged administrative access to the devices is handled through ARCON.

2018-09-09T05:40:00Z
author avatar
Real User

Primary use is to control Microsoft administrators.

2018-08-23T08:15:00Z
author avatar
Real User

We use it to access all the servers.

2018-07-10T09:06:00Z
author avatar
Real User

The primary use case is we want to control the access of the administrator. We have a lot of the administrators in our organization who have privileged access on the infrastructure, devices, servers, and network devices. We want to control this access, and at the same time, monitor this access. We use it to control privileged access of administrators on infrastructure and security devices, then monitor them from time to time.

2018-07-01T08:03:00Z
author avatar
Real User

The primary use of the solution is to give privileged access to critical resources, including monitoring and auditability.

2018-06-28T06:31:00Z
author avatar
Consultant

We have a team of people who do the administration activity for servers and databases before our kiosk came into the picture. They used to share a common user ID along with the password among each other. Now, after our kiosks came in, they login into our kiosks with their old user ID, enter the ID, and the underlying connection is a common ID, but the password, they do not know.

2018-06-27T12:45:00Z
author avatar
Real User

We use it for privileged access management for our production environment. We use it to record all of the changes that take place in our entire environment. That is the main function because there is a lot of compliance that we need to meet. It helps us meet those requirements.

2018-06-24T08:17:00Z
Find out what your peers are saying about ARCON, CyberArk, Broadcom and others in Privileged Access Management (PAM). Updated: October 2021.
554,382 professionals have used our research since 2012.