You are on page 1of 4

Privileged

Access
Management
(PAM)

www.secureki.com
Privileged Access
Management (PAM)

What is PAM? PAM Solution


SecureKi Privileged Access Management (PAM) is SecureKi Privileged Access Management (PAM) is a
the next generation automated privileged password simple-to-deploy, automated, proven solution for privileged
management solution with visual recording, fine-grained access management in physical and virtual environments.
access control, multifactor authentication, and Infrastructure Available as a rack-mounted, hardened hardware appliance
Single-Sign-On capabilities. or an Open Virtualization Format (OVF) Virtual Appliance.
SecureKi PAM enhances security by protecting sensitive
administrative credentials such as root and administrator

Challenges
passwords, controlling privileged user access, proactively
enforcing policies and monitoring and recording privileged
user activity across all IT resources with multifactor
As the integration of core infrastructure and business authentication.
system expand in the age of digital connectedness,
safeguarding privileged access is imperative to successfully
avert data breach and is a core requirement of multiple
compliance regimes.

SecureKi Privileged Access Management helps drive IT


security and compliance risk reduction and improves
operational efficiency by enabling privileged access defense
in depth—providing broad and consistent protection of
sensitive administrative credentials, management of
privileged identity access and control of administrator
activities.

C-13-09, Sunway Nexis, No 1, Jalan PJU 5/1, Kota Damansara, 47810 Petaling Jaya, Selangor info@secureki.com +603 7652 1188 +603 7652 1189
Hybrid Enterprise
Traditional Data Center Software Defined Data Center Public Cloud – laaS SaaS Applications

Enterprise Admin Tools SDDS Console and APIs Cloud Console and APIs SaaS Consoles and APIs

A New Security Layer – Control and Audit All Privileged Access


Centralized Automated Fine-Grained Access Control
Password Management Smart Analytics and Event Notification
Centralized Authentication Session Recording and Playback
Centralized Policy Management Workflow for Request and Approval
Privileged Single Sign-On Multi-factor Authentication

Centralized Policy Management


Privileged Access Management
APPLIANCE SPECIFICATION SHEET

SECUREKI ACM 1000, 2000, & 3000 SERIES

Identity Infrastructure Single-Sign On with OTP

Hardware OVF Virtual


Appliance Appliance
Deliver performance at scale with the OEM Dell EMC PowerEdge Server
Platform
Modern compute platforms from Dell EMC quickly scale and leverage key technologies to maximize
application performance. SecureKi ACM 1000 Series appliance, which OEM the Dell EMC PowerEdge
Server platform, is built on a scalable architecture that provides the choice and flexibility to optimize
performance and density.

Scale compute resources with Intel® Xeon® Scalable processors delivering a 27% increase in
processing cores and a 50% increase in bandwidth over the previous generation of Xeon
processors.
Flexible storage with up to 10 x 2.5 SAS/SATA/SSD with up to 4 NVMe PCIe SSD’s or 4 x 3.5.
Free up storage with boot optimized M.2 SSDs.

Rely on OEM Dell EMC PowerEdge Server platform with built-in security
Every Dell EMC PowerEdge server is made with a cyber-resilient architecture, building security into all
parts of a server’s life cycle. The Dell EMC server platform uses these new security features so you can
reliably and securely store all the sensitive data and credentials.

Integrated Password Management


Key Features & Benefits ▶ Support a variety of operating systems and
platforms (Unix / Windows / Database / Network
Ease of Management Devices / Applications / Security Equipment)
▶ Operated by agent and agentless system
▶ Regular password changes and audit management
▶ Supported protocols inclusive Telnet, SSH
▶ Built-in authorization procedures for the account
Password, SSH Key Login, RDP
password access permissions (password issued by
▶ Provided as an appliance or virtual appliance
approval workflow)
▷ Easy to install and manage
▷ Server Self-Health Check
Password Policy
▶ Remove hard-coded passwords in source code
▶ Change Request: Password automatically changes
▷ Push / Pull feature available
after use
▶ Periodic Changes: Change password based on
Reliable Operation random rules and schedule
▶ External USB Backup
▶ Force Change: The administrator can perform
▶ Redundancy of the appliance for High Availability
manual batch change
with data in real time sync
▶ Password verification function provided
Password Security
▶ Password protection for shared accounts and third
Compliance parties access
▶ Prevent the reuse of passwords
▶ Prevent reuse of the password and maximize the
▶ Mass password change feature
password complexity
▶ Integrated Mobile OTP for ACM Web
▶ Support one-way encryption that only stores the
Access Authentication
message digest hash value of each password in the
password vault
Workflow
▶ Account Request Application / Approval Function Hard-coded Password Management
▶ Request and approval for One-time Password ▶ Prevent hard-coded passwords in scripts via the
▶ Report of the request / Approval / User History provided API
▶ Delegate administrative rights ▶ Automatic request and update passwords within a
script

C-13-09, Sunway Nexis, No 1, Jalan PJU 5/1, Kota Damansara, 47810 Petaling Jaya, Selangor info@secureki.com +603 7652 1188 +603 7652 1189
Compliance Response Fine-Grained Access Control
▶ Account /password usage history report ▶ Granular command filtering with blacklist or
▶ Built-in reporting system for internal/external audit whitelist grouping
▶ Support fine-grained command control action with
Stability and High-Availability Block, OTP, Confirm & Notify option
▶ Password verification function (perform password
▶ Support regular expression in command control
change and operation verification)
▶ Support appliance redundancy (built-in HA
configuration supports real-time synchronization) Business Value Proposition
▶ External USB backup function (ensuring continuity
of service due to logical/physical failure) SecureKi Privileged Access Management (PAM) provides a
host of capabilities and controls that actively prevent
Session Recording and Playback attackers from carrying out critical components of their
▶ Real-time session monitoring, recording, and
attacks, as well as delivering additional support for reducing
playback capabilities for audit trails
risks and improving operational efficiency. More specifically,
▶ Audit on web-based application, client-server
SecureKi Privileged Access Management provides the
applications, SSH, Telnet & RDP
following benefits:
Built-in Security Mitigate Data Security Reduce risk.
▶ Physical Security: Disk encryption, disk Bay lock, the
Prevent unauthorized access and limit access to resources
console login restrictions, Multi-Factor Authentication
once entry is granted to the network. Protect passwords and
▶ Logical Security: HTTPS communication, AES / 256,
other credentials from unauthorized use and compromise.
ARIA encryption application, self-integrity check on
Limit the actions users can perform on systems and prevent
service process and adapters, audit logging
the execution of unauthorized commands and prevent lateral
Multi-Factor Authentication (MFA) movement within the network.
▶ Built-in with native Mobile Software MFA for IOS
and Android Increase accountability.
▶ Support mobile fingerprint-sensor for FIDO Observe full attribution of user activity, even when using
authentication shared accounts. Comprehensive logging, session recording
▶ Support offline login authentication with OTP and user warnings capture activity and provide a deterrent to
▶ Support Biometric authentication with Palm or unauthorized behavior.
Finger Vein scanner
▶ Support third party authentication integration Improve auditing and facilitate compliance.
▶ Support Apple devices using Face ID authentication Simplify compliance by providing support for emerging
authentication and access control requirements and limit the
Secure Single-Sign On with MFA scope of compliance requirements through logical
▶ Support palm-vein scanner or Mobile OTP segmentation of the network.
authentication auto-login to the target systems
▶ Auto-login without exposing credentials Reduce operations complexity with
automation.
Privileged single sign-on with MFA limits the risk of
password-gathering malware attacks and optimizes the
productivity of administrators with quick and secured access
to their remote systems. Centralized policy definition and
enforcement simplify the creation and enforcement of
security controls.

Common Criteria Certified (EAL2)


The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international
standard (ISO/IEC 15408) for computer security certification. Common Criteria provides assurance that the process of
specification, implementation, and evaluation of a computer security product has been conducted in a rigorous, standard, and
repeatable manner at a level that is commensurate with the target environment for use.

C-13-09, Sunway Nexis, No 1, Jalan PJU 5/1, Kota Damansara, 47810 Petaling Jaya, Selangor info@secureki.com +603 7652 1188 +603 7652 1189

You might also like