sPACE
Secure privileged accounts. Secure IT environment. Secure your business.
A Privileged Account Management Solution that integrates into any IT Environment
Secure harmony
in your IT infrastructure
Integrate sPACE into your security infrastructure to
Maximize your IT and secure investments:
Seamless integration into your existing IT infrastructure
Privileged task automation
Powerful tool for detection and investigation of security incidents
Enhanced availability of your IT systems enforcing business processes
User-friendly and reliable tool for secure privileged tasks
Streamline of secure privileged access to IT systems
Secure privileges
Control over both human and non-human privileged accounts in any environment (on-prem, cloud, hybrid)
Grant Just Enough, Just-in-Time Privileges
Secure vendor and contractor remote privileged access
Behaviour analysis, sharing experience and collaboration
Satisfy audit and compliance requirements:
Monitor administrators for all relevant systems
Create unchangeable audit logs for any privileged activity
Risks for Corporate IT Systems
- Unauthorized privileged access to your systems through compromised vendors’ credentials.
- Usage of old and untrusted software which violate the security policy.
- Infiltration of the target system, spreading malware in a network.
An attacker who hijacked privileged credentials is able to ruin other security systems. That is why your privileged accounts are prime targets for hackers and require special protective tools – privileged access management systems (PAM). Use PAM to reduce a risk of security breaches such as:
WHO NEEDS PAM-SOLUTIONS
Executives
- Access control compliance
- Full visibility and control over privileged access
IT Leaders
- Minimize a chance of privileged account compromise through just enough, just in time privileged access
- Control over privileged users’ activity including third-part vendors and contractors.
IT personnel
- User-friendly tool to perform the tasks fast and easily.
- Streamline of secure privileged access to IT systems
Secure IT environment
Privileged users are easier to manage than to control
1
Passwords are stored in a secure system
Users do not know access passwords to IT systems and get them automatically when a session starts.
2
Automatic password and key rotation
Password and access keys for IT systems are changed automatically and synchronized in linked resources.
3
Secure administration environment
Access to target IT systems is granted in an isolated secure environment.
4
Administration session record
Administrators’ activity is automatically recorded, administration sessions are logged.
5
Anomalous user behavior detection
IT system administrators’ behavior is analyzed by a special 24x7 system, the session may be finished by force.
HOW sPACE WORKS
1
запрос на подключение к целевой системе и идентификация пользователя
2
выбор схемы подключения (инструменты / учетная запись / целевые системы) и запрос учетных данных
3
обработка запроса и выдача настроек на подключение
4
передача параметров подключения (сессионный токен)
5
подключение к защищенной среде
6
запрос привилегий
7
подтверждение полномочий
8
запрос секрета
9
предоставление секрета
10
подключение к целевой системе
11
получение запроса
12
запись сеанса
13
предоставление удаленного доступа к приложению
14
модуль управления запускает ротацию паролей в модуле управления секретами
15
модуль управления секретами обновляет пароли в целевой системе
16
модуль управления секретами записывает актуальные данные в защещенное хранилище
Privileged users
1
5
4
Web portal
2
3
Control module
Secure administration environment
Session
manager
manager
6
7
8
9
Secure Vault
10
11
12
Session record
13
Session Auditor
Target system
Secret management module
14
15
16
Computer Hardware
Databases
Applications
Network & Security Appliances
Mainframes
Middleware
Environments
Contacts
Learn more about sPACE
Phone
+7 (495) 925-7794
Email
info@s-pace.ru
Website developed by SOLWE