Senhasegura Privileged Access Management Solution

Privileged Access Management (PAM) is formed by a set of cybersecurity strategies and technologies to exercise control over privileged access and permissions for users, accounts, processes, and systems in a technological environment.
A PAM is an ideal solution for preventing and mitigating damage resulting from external attacks, as well as from the neglect of internal employees and other insider threats against privileged credentials, specifically.

Management flow of Privileged Access

PAM

Functionalities of Privileged Access Management

SOCIAL NETWORKS

social-icons
Manage and keep the credentials  of the social networks of your  company protected against  undue publications and users  with bad intentions.

SCAN AND DISCOVERY

circle
Perform the search for devices  and credentials in your network  in an automatized manner and  keep the solution prepared to  serve all the access demands.

LOGGED SESSION

laptop
Define the users who will  execute the logged session,  monitored and 100% recorded,  including simultaneous sessions.

SESSION RECORDING

icon
Record 100% of the remote  sessions performed in  senhasegura in compact videos  in excellent quality, including  simultaneous sessions.

AUTOMATIC CHANGE

key
Automatically change the  passwords every time the  authorized expiration use is  finished. Ensure the undertaking  of each password.

APPROVAL WORKFLOW

handkey
Keep control of the access to a  managed device or a personal  credential through a multilevel  and flexible approval workflow.

APP TO APP

appapp

BRING TO SENHASEGURA THE INTEGRATION CREDENTIALS BETWEEN  SYSTEMS, DATABASES OR CONFIGURED IN SOURCE CODE.

JUMP SERVER

alarmlight
Accesses via Putty or RDP may  be performed through monitored  sessions, without the password  being exposed to the requiring  user.

COMMANDS AUDIT

cctv
Configure commands alerts in  SSH sessions, Telnet and  databases even for administrator  users.

MULTIPLE CUSTODY

humankey
Stablish double custody of  passwords and keep the  conformity with your security  and audit controls.