Hitachi ID Privileged Access Manager Business Case
In an organization with thousands of IT assets, it
can be difficult to securely manage access to privileged accounts:
- There can be thousands of privileged passwords.
- Administrator passwords exist on each device and application.
- It is difficult to coordinate changes to shared passwords.
- When there are many shared, static passwords, former IT staff can
retain sensitive access after leaving an organization.
- It can be difficult to trace changes back to individuals who made
Improving Security with Hitachi ID Privileged Access Manager
Privileged Access Manager helps organizations to secure privileged accounts:
- Eliminate static and shared passwords.
- Enforce strong authorization controls over who can
access which administrative account and when.
- Personally authenticate IT staff before granting access to
- Create an audit log of who accessed each privileged account and when.
Privileged Access Manager is a system for securing access to privileged accounts. It works by regularly randomizing privileged passwords on workstations, servers, network devices and applications. Random passwords are encrypted and stored on at least two replicated servers.
- Business Case:
Privileged Access Manager helps organizations secure access to privileged accounts by randomizing their passwords and forcing users to sign into Privileged Access Manager when they need privileged access. It automatically deactivates access for departed IT users and creates a forensic audit of login session to sensitive accounts.
- Screen Shots:
Snapshots of the Privileged Access Manager web interface.
- Screen Recordings:
Recordings of user interaction with Privileged Access Manager.
- Concept Animations:
Animated demonstrations illustrating user interaction with Privileged Access Manager and data flow between components on the network.
- Slide Decks:
Slide presentations that discuss privileged access management in general and Privileged Access Manager in particular.