RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Servionika: Control of privileged users

Product
Developers: Servionika
Date of the premiere of the system: 2016/11/18
Technology: SaaS - The software as service,  cybersecurity - Authentication

Control of privileged users - a cloud service is provided on the SECaaS model (Security as a Service).

On November 18, 2016 the Servionica company announced Control of Privileged Users service for tracking of actions of authorized users in corporate systems.

The official presentation and the beginning of representation of service are dated for an action of TAdviser SECURITY DAY 2016. It is supposed that Andrey Sokolov, the head of information security Servionika, will present a cloud service in the report "Keys from the kingdom. SECaaS". His performance in the program of the morning section TAdviser SECURITY DAY 2016 22 of November, 2016.

Privileged Account Management

SECurity as a Service

Some categories SecaaS are already usual — anti-virus and an antispam - e-mail filtering in a cloud, services for protection against DDoS attacks. More and more security subsystems go to a cloud as it allows to protect data in new IT systems and to adapt to quickly changing IT infrastructure.

Cost analysis

The technology helps to provide a package of measures for control of actions of users with the rights of administrators, to access control to information systems, rapid response to incidents and carrying out audits, to increase efficiency of the external contractors having access to IT systems of customers.

The Control of Privileged Users service is created on the basis of technological solutions of vendors which products are certified according to requirements of FSTEC of Russia and can be used for data protection in government institutions.

By means of a complex of the certified solutions deployed in a cloud of Servionika, customers can control actions of users registration in files of magazines and video, to limit a possibility of command input, to manage on a centralized basis access to information systems.

For example, the user can enter information space of the company on the to the login and the password, but access directly to business and critical applications is executed on accidentally generated password created by a system. It complicates an opportunity for malefactors - to get access to important data bypassing a system. At emergence of incidents it is possible to book quickly audit of the performed operations on the basis of information recorded by a system in event logs. Besides, it helps to control actions of external contractors, fixing the executed manipulations and real time of works.