Critical Capabilities Use-Cases Score PASM Windows PEDM Unix / Linux and macOS PEDM Secrets Management CIEM 4.03/5 3.70/5 4/5 4.8/5 3.60/5 Analyst's Coverage * Source: Gartner Critical Capabilities for Privileged Access Management 2022 ARCON Ranked no 1 in all 5 Use Cases in the Gartner Critical Capabilities for Privileged Access Management 2022
ARCON Product Suite Privileged Access Management (PAM - Enterprise) PAM Standard / Lite (PAM Cloud) User Behavior Analytics (UBA) Security Compliance Management (SCM) Endpoint Privilege Management (EPM) Identity and Access Management (IDAM) Single Sign-On (SSO) Enterprise Vault & Secrets Management (EVM) Enterprise Cloud Governance (ECG)
Root & Cause Cause Effect Multiple admins Shared Privileged Credentials Weak approval processes Shared Privileged Credentials Lack of accountability Lack of audit trails
Pillars of a PAM Solution Privileged Account Lifecycle Password Policies & Scheduled / Manual Rotation Break the glass / Encrypted Password Envelope Centralized Portal for Ease of Access Role Based Access Management Seamless Single Sign-On across all protocols of Devices & Application 2FA Authentication End to End Encrypted Session Text / Video Session Recording Session Management Audit Logs & Reports Real Time Session Management Role Based Granular Access Controls Least Privileged Management & Threat Analytics Zero Trust Management Password Vaulting Single Sign-On & 2FA Privileged Session Management Access Control Management Pillars of a PAM Solution
Role Based Access Management Secured Encrypted End to End Session Management Fine-Grained / Granular Access Control Password LifeCycle with Vaulting & Rotation Password Reconciliation Dual / Multi-factor Authentication Just-In-Time Privileges & Zero Trust Access Secured Remote Access Seamless Single Sign-On Multi Domain Authentication & Authorization Multi-Tenant Hybrid Environment Hybrid & Distributed Architecture Virtual Grouping – Role Based Access Management Workflow Management Privileged Elevation and Delegation Management (PEDM) Auto-discovery & Onboarding Behavior Analytics One Admin Console Multi-tab Console Compliance Related Audit Report Smart Audit Trails Text & Video Logs (Session Recording) Session Monitoring (Real Time Session Monitoring Reporting / Dash boarding ARCON Privileged Access Management
Web Application Integration Single Sign-On Session management Password management Access control with workflows
Integration for Developer Tools DevOps CI/CD Tools Provide Credentials to Security Tools RPA Tools Containers or Container orchestration platforms Elastic Scaling Automation Solutions
Authentication AD / LDAP / Directory Store Multi- Domain Multi- Tenancy Dual Factor Access Cards Web Based Local Authentication 01 02 03 04 05 06 07
Best Fit Architecture **secured gateway is optional if not ports from local pc should be open example: SSH, RDP, DB etc. Highly Scalable - Best For Data Centre SSH RDP DB App Server Vault / Log Server **Secured Gateway Doesn’t impact the current connections
End User ARCON URL Arcon ARCON User Secure Connection *22, *444 ARCON Secured Server Data Center Network Devices Terminal Server Web Server Linux Server Windows Server DB Server Application Server On demand Connection Secured Connection * Port to be open Dedicated Connection Blocked Connection ARCON User Biometric Mobile OTP 2 nd Factor Authentication Active Directory ARCON DB & Password Vault 389 1450 / 1433 443 *443 RSA Token SMS OTP PAM – Access Flow ARCON Application Server
High Level Architecture Data Center Network Devices Terminal Server Web Server Linux Server Windows Server DB Server Application Server
Deployement Architecture – Multi Tenant Environment Client Main DC DR DC Centralized Deployment and managing Hybrid / Complex Datacenter
Break Glass Scenario Scheduled Password Envelope APEM Tool Installed System (Unique Fingerprint) Passwords stored in encrypted format Admin accesses the APEM Tool Receives password Gains access to the data center In the Break glass scenario, the ARCON Password Envelope Management Tool is used to retrieve the stored encrypted passwords in the ARCON PAM Solution. The Schedule Password Envelope mechanism is set up to send all encrypted passwords to Email IDs / shared drive. Passwords will be required to open the envelopes. Administrator
*Note: The above is useful for defense or data sensitive organizations. Highly Scalable Architecture A unique tunneling architecture, highly scalable Another unique application streaming architecture for web or third-party clients which are not secured. AGW can help in connecting using the standard 443 port. Connections can be established using any route. For example if a user is accessing from outside network can establish a channel through the AGW.
Why ARCON SaaS Arcon PAM module hosting in ARCON SaaS environment Infrastructure level admin activities/ configurations would be handled by ARCON ARCON will be responsible for Uptime / Availability (99.9%) and Scalability (auto-scalability) of the solution Hardening of servers based on CIS benchmark and network Security around the solution is the responsibility of ARCON Maintenance / Upgrade / Support Both for Infra and the product will be managed by ARCON Licensing / deployment and maintenance of OS / DB / Anti-virus and other monitoring components will ARCON's responsibility
SaaS Ready ARCON | PAM SaaS eliminates the deployment efforts Shift focus from infrastructure maintenance to security enhancements Achieve higher scalability Lower operation expenses
ARCON | SaaS - Gateway on Cloud
Multi-tab A New Way to Access Easy navigation for admins in between multiple sessions List of all the available services readily available No need to toggle multiple windows
Auto-Onboarding Rule-based automation for AD Users & Servers Semi and Automatic configuration options
AD Bridging Map AD Users for accessing the Linux boxes Manage AD Credentials in PAM for Linux Service creation for SSO
Smart Session Monitoring Smart Session Monitoring provides with amazing data points to help in support our AI/ML Models Helps to identify critical events Video Logs are very intelligent Many third party applications(web or thick clients) can also be monitored