Skip to main content

White Papers

arrowFrequently Asked Questions
  • General Introduction to Privileged Access Management:
    Introduction to the business challenges of securely managing access to privileged accounts and the technical approaches available to secure administrator, service and application-to-application IDs.
  • Privileged Access Manager Product Q&A:
    Introduction to the business challenges of securely managing access to privileged accounts and the technical processes built into Privileged Access Manager to secure access to administrator, service and application-to-application IDs.
arrowHitachi ID Privileged Access Manager Product Literature
  • Hitachi ID Privileged Access Manager Brochure:
    One page glossy product brochure for Hitachi ID Privileged Access Manager.
  • Securing Privileged Accounts with Hitachi ID Privileged Access Manager:
    Hitachi ID Privileged Access Manager enables organizations to secure privileged accounts. It periodically randomizes privileged passwords. Users must sign into it when they need to access a sensitive account. The password change and access disclosure process creates strong, personal authentication authorization over which passwords are visible to whom and audit of access attempts (AAA).
  • Hitachi ID Privileged Access Manager Features:
    Hitachi ID Privileged Access Manager is a system for securing access to privileged accounts across many servers and workstations. It periodically randomizes privileged passwords, stores the values in a replicated database and - when appropriate - discloses access to administrators, applications and services.
  • Securing Embedded Passwords with Hitachi ID Privileged Access Manager:
    Applications often need to connect to other applications or services on the network to function. For example, a web application may have to connect to one or more databases to retrieve or update data, to web services to initiate transactions, to a directory to create or update user objects, etc.
arrowPrivileged Access Management Basics
  • Securing Privileged Accounts:
    Identifies technical challenges and offers solutions for effectively managing access to large numbers of sensitive accounts.
arrowPrivileged Access Management Best Practices
  • Best Practices for Managing Access to Privileged Accounts:
    Describes the business problems that a privileged access management system is intended to address. Goes on to describe best practices for defining and enforcing policies regarding access to privileged accounts on a variety of systems.
  • Data Replication in Privileged Credential Vaults:
    Privileged passwords must be protected more vigorously than any other data in an organization. This document describes why and how.
  • Design and Implementation of Administrator Session Monitoring:
    This document introduces the business case for implementing a session monitoring system to record login sessions to privileged accounts. It examines a series of technological design decisions that must be considered when developing a session monitoring system and offers guidance about how such a system might be best deployed and managed in practice.
page top page top