Information Security

Privileged Management

Control and audit administrative access through secure, automated, policy-based workflows with Dell One Identity solutions. These solutions provide capabilities for granting access, granular delegation of “superuser” rights, session recording and key stroke logging of activity, and governance over privileged access and accounts. The results are enhanced security and compliance with more efficient “superuser” access administering, tracking and auditing.

Privilege safe

Automate, control and secure the entire process of granting administrative credentials. Conform credentialing to established policies with appropriate approvals. Create a comprehensive audit trail of the credentialing process. Overcome security concerns by using a safe, hardened appliance for privileged password management.

Privileged account governance

Extend the governance advantages of unified policy, automated and business-driven attestation, enterprise provisioning, and access request and fulfillment to privileged accounts and administrator access. Simplify privileged governance by giving organizations the ability to define roles and associated policies, access approval workflows and perform periodic attestation of privileged access.

Active Directory bridge

Extend the unified authentication and authorization of Microsoft Active Directory to Unix, Linux and Mac systems using the Dell One Identity AD bridge. Remove the stand-alone authentication and authorization requirement of native Unix in favor of the single identity, one account, single point of management available through Active Directory for Microsoft Windows systems.

Unix root delegation

Implement a least-privilege security approach with granular delegation of administrative access on Unix and Linux systems. Protect your organization and prevent security breaches by providing only the appropriate amount of access administrators need perform their duties.

Windows administrative delegation

Control access to Microsoft Windows administrative accounts through delegation using a least-privilege model. Use defined administrative policies and associated permissions to generate and strictly enforce access rules, eliminating the errors and inconsistencies common with native approaches to Windows privilege management.

Session management

Improve security and achieve compliance by limiting privileged access for administrators, remote vendors and high-risk users to a specific duration or session. Take advantage of full-session recording and replay capabilities to simplify auditing and help ensure compliance.

Centralized sudo administration

Streamline administration and easily provide access control reporting for sudo. Adopt a solution that enhances sudo with a central policy server, plus centralized management of sudo and sudoers’ policy files. Simplify administration with centralized reporting on sudoers, access rights and activities, as well as keystroke logging of activities performed through sudo.

Multifactor authentication

Enhance security by requiring a second factor of authentication for user, administrative or superuser access. Integrate multifactor authentication with privileged account management for an added layer of security for these most powerful users and accounts.