55% of security breaches are related to a misuse of privileged accounts, as much as 60% of incidents result from an administrator’s mistake (Source: Verizon “2015 Data Breach Investigation report”). Privileged accounts enable unrestricted access to essential IT resources: main servers, networking equipment or users’ workstations. Lack of control over privileged users is a direct threat to the integrity and security of your data. Moreover taking over access to privileged accounts by an outsider, can lead to data leaks or a company being compromised.
This is why it is important to implement proven solutions, which constantly manage the entire privileged architecture, including users, accounts and remote access sessions.
|Price: on premise appliance||Free (up to 5 servers)||TBC|
|Price SaaS||Free (up to 5 servers)||TBC|
|Virtual Machine(VMWare / Virtual Box / KVM / HyperV / XEN)|
|Cloud(AWS / Google / Azure / OpenStack) - via API||planned|
|RDP||(one screen up to full HD)|
|HTTP/HTTPS - rendered|
|Access and authentication|
|Storage capacity||no limit||no limit|
How does the Session Recording work?