Presentation Privelege Access Management.pptx

SumanSaurav238826 29 views 23 slides Jul 28, 2024
Slide 1
Slide 1 of 23
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23

About This Presentation

PAM


Slide Content

ARCON PRESENTATION 2023

Gartner MQ – 2021 & 2022

Critical Capabilities Use-Cases Score PASM Windows PEDM Unix / Linux and macOS PEDM Secrets Management CIEM 4.03/5 3.70/5 4/5 4.8/5 3.60/5 Analyst's Coverage * Source: Gartner Critical Capabilities for Privileged Access Management 2022 ARCON Ranked no 1 in all 5 Use Cases in the Gartner Critical Capabilities for Privileged Access Management 2022

ARCON Product Suite Privileged Access Management (PAM - Enterprise) PAM Standard / Lite (PAM Cloud) User Behavior Analytics (UBA) Security Compliance Management (SCM) Endpoint Privilege Management (EPM) Identity and Access Management (IDAM) Single Sign-On (SSO) Enterprise Vault & Secrets Management (EVM) Enterprise Cloud Governance (ECG)

Root & Cause Cause Effect Multiple admins Shared Privileged Credentials Weak approval processes Shared Privileged Credentials Lack of accountability Lack of audit trails

Pillars of a PAM Solution Privileged Account Lifecycle Password Policies & Scheduled / Manual Rotation Break the glass / Encrypted Password Envelope Centralized Portal for Ease of Access Role Based Access Management Seamless Single Sign-On across all protocols of Devices & Application 2FA Authentication End to End Encrypted Session Text / Video Session Recording Session Management Audit Logs & Reports Real Time Session Management Role Based Granular Access Controls Least Privileged Management & Threat Analytics Zero Trust Management Password Vaulting Single Sign-On & 2FA Privileged Session Management Access Control Management Pillars of a PAM Solution

Role Based Access Management Secured Encrypted End to End Session Management Fine-Grained / Granular Access Control Password LifeCycle with Vaulting & Rotation Password Reconciliation Dual / Multi-factor Authentication Just-In-Time Privileges & Zero Trust Access Secured Remote Access Seamless Single Sign-On Multi Domain Authentication & Authorization Multi-Tenant Hybrid Environment Hybrid & Distributed Architecture Virtual Grouping – Role Based Access Management Workflow Management Privileged Elevation and Delegation Management (PEDM) Auto-discovery & Onboarding Behavior Analytics One Admin Console Multi-tab Console Compliance Related Audit Report Smart Audit Trails Text & Video Logs (Session Recording) Session Monitoring (Real Time Session Monitoring Reporting / Dash boarding ARCON Privileged Access Management

Web Application Integration Single Sign-On Session management Password management Access control with workflows

Integration for Developer Tools DevOps CI/CD Tools Provide Credentials to Security Tools RPA Tools Containers or Container orchestration platforms Elastic Scaling Automation Solutions

Authentication AD / LDAP / Directory Store Multi- Domain Multi- Tenancy Dual Factor Access Cards Web Based Local Authentication 01 02 03 04 05 06 07

Best Fit Architecture **secured gateway is optional if not ports from local pc should be open example: SSH, RDP, DB etc. Highly Scalable - Best For Data Centre SSH RDP DB App Server Vault / Log Server **Secured Gateway Doesn’t impact the current connections

End User ARCON URL Arcon ARCON User Secure Connection *22, *444 ARCON Secured Server Data Center Network Devices Terminal Server Web Server Linux Server Windows Server DB Server Application Server On demand Connection Secured Connection * Port to be open Dedicated Connection Blocked Connection ARCON User Biometric Mobile OTP 2 nd Factor Authentication Active Directory ARCON DB & Password Vault 389 1450 / 1433 443 *443 RSA Token SMS OTP PAM – Access Flow ARCON Application Server

High Level Architecture Data Center Network Devices Terminal Server Web Server Linux Server Windows Server DB Server Application Server

Deployement Architecture – Multi Tenant Environment Client Main DC DR DC Centralized Deployment and managing Hybrid / Complex Datacenter

Break Glass Scenario Scheduled Password Envelope APEM Tool Installed System (Unique Fingerprint) Passwords stored in encrypted format Admin accesses the APEM Tool Receives password Gains access to the data center In the Break glass scenario, the ARCON Password Envelope Management Tool is used to retrieve the stored encrypted passwords in the ARCON PAM Solution. The Schedule Password Envelope mechanism is set up to send all encrypted passwords to Email IDs / shared drive. Passwords will be required to open the envelopes. Administrator

*Note: The above is useful for defense or data sensitive organizations. Highly Scalable Architecture A unique tunneling architecture, highly scalable Another unique application streaming architecture for web or third-party clients which are not secured. AGW can help in connecting using the standard 443 port. Connections can be established using any route. For example if a user is accessing from outside network can establish a channel through the AGW.

Why ARCON SaaS Arcon PAM module hosting in ARCON SaaS environment Infrastructure level admin activities/ configurations would be handled by ARCON ARCON will be responsible for Uptime / Availability (99.9%) and Scalability (auto-scalability) of the solution Hardening of servers based on CIS benchmark and network Security around the solution is the responsibility of ARCON Maintenance / Upgrade / Support Both for Infra and the product will be managed by ARCON Licensing / deployment and maintenance of OS / DB / Anti-virus and other monitoring components will ARCON's responsibility

SaaS Ready ARCON | PAM SaaS eliminates the deployment efforts Shift focus from infrastructure maintenance to security enhancements Achieve higher scalability Lower operation expenses

ARCON | SaaS - Gateway on Cloud

Multi-tab A New Way to Access Easy navigation for admins in between multiple sessions List of all the available services readily available No need to toggle multiple windows

Auto-Onboarding Rule-based automation for AD Users & Servers Semi and Automatic configuration options

AD Bridging Map AD Users for accessing the Linux boxes Manage AD Credentials in PAM for Linux Service creation for SSO

Smart Session Monitoring Smart Session Monitoring provides with amazing data points to help in support our AI/ML Models Helps to identify critical events Video Logs are very intelligent Many third party applications(web or thick clients) can also be monitored
Tags