e-DMZ Security is an award-winning provider of privileged access control solutions for today’s enterprises looking to control, audit and record privilege sessions such as remote administrators, vendors or privileged internal access.
Its Total Privileged Access Management (TPAM) suite is a modular, cost-effective solution for privileged user, privileged identity and privileged access control. Built on the award winning Password Auto Repository™ (PAR) and eGuardPost™ appliances, TPAM delivers security and compliance across all market verticals with over 350 installs in over 17 countries world-wide. Customers include many of the world’s largest enterprises in banking, insurance, pharmaceutical, manufacturing and more.
1. Solution Overview Best Regulatory Compliance Solution Best Password Management Solution Mach 2010
2.
3.
4.
5.
6.
7.
8.
9. Workflow – Password Request Initiate Password Request Filter & Select Account(s) Enter Date/Time/Duration/Reason Password is needed Optional ticket field. Can be active (check ticket) or passive. Retrieve Password
10. Workflow – Small Screen Hyperlink Format Initiate Request * Small screen support configured on a per user basis Filter Request or view most recent Select Password. Quick Request automatically submits with default reason “Request from mobile device” Enter ticket number (if required) and submit to get password Password retrieved from handheld.
11.
12.
13.
14.
15.
16. Workflow – Session Request Request a session connection Select from a list of systems and accounts the specific user has authorization to request connections too. Enter date/time/duration of connection request. Can request for future date/time to allow advanced approval if under dual authorization control. Once connection approved (or auto approved) simply CONNECT!
17. Workflow – Session Request User connected and performs required work Session can be configured for interactive or auto-login EVERY action on the target system will be recorded (Keystrokes, mouse, links, etc.) If user session extends beyond requested time, configurable alert notifications of session overrun can be sent Active sessions can be manually terminated by authorized administrators Connection proxy created to selected System and Account
18. Workflow – Session Replay Session recordings are kept local or can be automatically archived. Stored sessions can be searched based on date, system, account, user and/or ticket number Once selected, REPLAY SESSION will retrieve session and replay.
19. Workflow - Session Replay All session activity is recorded and viewable Via session replay. Recording are NOT AVI type files – recording size is compressed and VERY manageable. DVR- Style controls allow control of replay of Recorded sessions.
20.
21.
22. Workflow – Command Management Commands are added via the Privileged Command Management Tool.
23. Workflow – Command Limited Session Same workflow as normal session request. Same workflow as normal session request
24. Workflow – Command Limited Session Session is to back-end target/account (Windows A3/e22egp) via PCM, user session is established and user is placed into the specific “command”. In this example, Computer Management. No access to other target commands, menu’s, etc. is allowed. The session will only exist within the context of the specific command (eg. Computer Management). Once the user exits the command, the session is immediately terminated.