member sign-in
Forgot password? Create new account Close

Access Management


Access Management encapsulates people, processes and products to identify and manage the data used in an information system to authenticate users and grant or deny access rights to data and system resources. The goal of the Access Management is to provide appropriate access to enterprise resources.

Enterprise Single Sign On

Enterprise Single Sign On is a technology developed to ease access to systems providing subsequent and automatic authentication when accessing once the product, without bringing any modifications to the target systems. Enterprise Single Sign On technology also handles password ...

Privilege Account / Password Management

Privilege Account / Password Management is a policy based technology that secures, manages and monitors all privileged accounts and activities associated with datacenter management whether on - premise or in the cloud: Control access to privileged accounts Monitor ...

Privileged Elevation and Delegation Management (PEDM)

Removal of privileged accounts Granular management and elevation of individual tasks ...

Web Access Management

Web Access Management applies to technologies that use access control engines to provide centralized authentication and authorization capabilities for Web applications. WAM products may also include basic identity administration, role/rule administration, and audit and federation ...

User / Strong Authentication

Strong authentication is a two-factor authentication or multifactor sign-on authentication process that creates a higher level of security for granting privileges to an application. Strong authentication combines two or more independent factors of identification, such as ...

PKI / Digital Certificate Solutions

Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to provide and implement certificate services and other services related to the infrastructure. In cryptography, a PKI is an arrangement that binds public keys with respective ...

Application and Transaction Security / HSM

Application and Transaction Security / HSM it’s a technology designed for managing digital keys and for enabling digital signings using a secure crypto processor. HSMs are physical devices that come in different forms such as plug-in card or an external TCP/IP security ...


  • AVECTO Microsoft Vulnerabilities Report 2017

      The 2017 Microsoft Vulnerabilities Report reviews the latest trends and reveals that the number of published vulnerabilities has risen by 111% over five years. The results make a compelling case for least privilege, finding that of the 235 Critical vulnerabilities reported in 2017, 80% would be mitigated by removing local admin rights from users. This figure rises to 88% if we consider all Critical vulnerabilities from the last five years. Three reasons to download the report: •    A detailed breakdown of all ...

    read all
  • Avecto and Provision Announce New Security Partnership for Romania, Bulgaria and Moldova

    Avecto, a global leader in endpoint privilege management, announced today that it has entered into a distribution partnership with Provision Software Division, headquartered in Bucharest, Romania, that will bring Avecto’s Defendpoint software to Provision’s resellers and customers in Romania, Bulgaria and the Rep. of Moldova. Founded in Romania, in 1997, Provision is a leading Romanian value-added distributor that provides a broad offering of enterprise security solutions and professional services. Provision will extend Avecto’s reach into Eastern ...

    read all
  • To Improve Health IT Security, Recognize the Importance of Privilege

    The increased use of electronic medical records and rapid advances in healthcare technology have made hospitals target-rich environments for hackers. Unfortunately, the maturity of hospitals’ cyber security programs often are years behind that of other technology-dependent sectors, such as financial services. It’s no surprise that cyber security was a prominent topic at this year’s HIMSS conference. In our conversations with industry professionals, we hear a widespread concern about the security posture at their hospitals. Outdated and unsupported ...

    read all
  • Thales Supports Customer-Supplied Encryption Keys on Google Cloud Platform to give Businesses Additional Options for Control

    nShield HSM “bring your own key” now available for Google customers supplying keys Thales, a leader in critical information systems, cybersecurity and data protection, announces support for Google Cloud Platform’s Customer-Supplied Encryption Key (CSEK) functionality. Google Cloud Platform customers can now generate, protect, and supply their encryption keys to the cloud using an on-premise, FIPS-certified nShield hardware security module (HSM) from Thales. The new CSEK support empowers enterprise customers who want to move workloads and data ...

    read all
  • Peer-To-Peer Guidance From Industry-Leading CISOs

    The CISO View is a CyberArk-sponsored industry initiative that explores CISO perspectives on topics related to improving privileged access controls and shares their practical advice on security strategies. Insights and recommendations in the available reports are based upon interviews with Global 1000 CISOs and guest contributors.     NOW AVAILABLE | Rapid Risk Reduction: A 30-Day Sprint to Protect Privileged Credentials How ...

    read all