Thycotic Secret Server

Thycotic Secret Server

Secret Server Overview PRIVILEGED ACCOUNT MANAGEMENT PASSWORD MANAGEMENT FOR IT ADMINS AN ENTERPRISE-CLASS MEET COMPLIANCE Thycotic has numerous high- PASSWORD MANAGEMENT MANDATES profle clients, and their product VAULT has proven to be a mature Improve standings with auditors and enterprise class Privileged Lock down sensitive account passwords maintain compliance through password Management solution. on-premises. Integrate with Active management. Martin Kuppinger Directory. KuppingerCole IT Security Firm • Produce full audit reports on vault • Get full audit reports for compliance activity. mandates. • Record and monitor IT admin sessions. • Automate privileged account discovery • Keylogging for deeper visibility. SYSTEM REQUIREMENTS and password changing. • HIPAA, PCI, SOX, NIST, Basel II, FIPS • Windows local admin accounts, • Microsoft Windows Server 2008 + • Microsoft .NET Framework 4.5.1 service/application accounts, UNIX/ MANAGE SERVICE • IIS / ASP.NET Linux, web and more. ACCOUNTS • Microsoft SQL Server 2008 + ELIMINATE INTERNAL AND Never lose track of service accounts or PRICING STRUCTURE EXTERNAL THREATS application pools again. Edition Choose your feature set. Don’t just vault IT credentials. Know • Instantly discover service accounts on (one time cost) exactly who has access to key systems. the entire network. Users Each person that needs • Rotate service account passwords access to Secret Server. (one time cost) • Real-time session monitoring, without breaking dependencies. Support Tech support + all new recording and keylogging keeps a releases. (annual) watchful eye on IT. EXPERIENCE IMMEDIATE ROI • Integrate with SIEM and vulnerability scanners for heightened network Achieve value on Day 1. Installation < 1 Free 30-Day Trial security. hour. Maintenance < 2 hours a week. No and Personalized Web Demo bulky hardware appliance. 1101 17th Street NW Suite 1102 p: +1 202-802-9399 Washington DC 20036 t: @thycotic DC | LONDON | SYDNEY www.thycotic.com Secret Server Architecture SECURE PASSWORD VAULT AUTOMATED ACCOUNT ENHANCED SECURITY: MANAGEMENT AUDITS & COMPLIANCE • Role-Based Access Control (Admin, User, Auditor, Custom) • Intuitive deployment (agent optional) • Session launcher • Active Directory authentication • Automatic discovery (RDP, PuTTY, Web, SecureCRT, MSSQL, • AES 256 and SSL encryption • Windows local accounts PowerShell, cmd, custom) • Customizable Secret templates • Automatic password changing • Two-factor authentication • HSM encryption key storage (optional) • Network accounts (RADIUS, soft token) • Web-based access • Service/application accounts • Session recording and monitoring (Internet Explorer, Firefox, Safari, Chrome) (Windows Services, Scheduled Tasks, COM+, • Custom approval workfows • Desktop client (Windows / Linux) App Pools, Flat Files, PowerShell) (Check Out, Request Access, Require Comment) • Smartphone applications • Full audit logs and customizable alerts (iPhone, Android, BlackBerry, Windows) • SIEM integration • Vulnerability scanning integration PLATFORMS & INTEGRATIONS SEAMLESS DISASTER RECOVERY • Windows local • VMware ESX / • Check Point • Salesforce admin ESXi • Enterasys • Google • Database Mirroring, AlwaysOn, SQL • Active Directory • SonicWALL • Dell DRAC • Amazon cluster • UNIX / Linux / • Cisco • HP iLO • ODBC • Front-end clustering for high Mac • Juniper • SSH / Telnet • AS/400 availability • MS SQL Server • SAP • OpenLDAP • PowerShell • Automatic backups • Oracle • F5 • DSEE • Clear text export • Sybase • WatchGuard • Remote DR site support • MySQL 1101 17th Street NW Suite 1102 p: +1 202-802-9399 Washington DC 20036 t: @thycotic DC | LONDON | SYDNEY www.thycotic.com.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us