Previous PDF

swipe to navigate

Privileged password storage must be:

  1. Encrypted.
  2. Replicated.
Replication must:
  1. Span at least two sites.
  2. Include all passwords.
  3. Happen in real time.
  4. Be inexpensive and easy to manage.
The replication protocol must:
  1. Be encrypted.
  2. Tolerate low bandwidth.
  3. Tolerate high packet latency.
  4. Recover from network interruptions.
Native replication features in Oracle and Microsoft databases do not meet all of the above conditions, so application-level replication is preferable. Hitachi ID Privileged Access Manager includes appropriate replication technology out of the box.

Previous Next PDF