Quest One Privileged Session Manager - Features

Control Access – Authorized users can request a session on specific resources or through specific administrative accounts using a secure web browser connection. Each user can view only the specific resources to which he or she is authorized to request access. You can configure the connection for authorization workflow to further enhance control and achieve compliance.

Proxy Access – Privileged Session Manager proxies all sessions to target resources. Since users have no direct access to resources, the enterprise is protected against viruses, malware or other dangerous items that may exist on the user’s system. Privileged Session Manager can proxy and record Windows, Unix/Linux, AS/400, Web applications, network devices, firewalls, routers and more.

Scalable Appliance – The appliance for Privileged Session Manager provides secure, hardened, enterprise-ready access and management of shared credentials for more than 250,000 accounts at once.

Session Recording – All access through Privileged Session Manager is recorded and archived for post-session and forensics review. Only actual activity is recorded, and recordings are compressed to minimize offline storage requirements to a fraction of the size required by other session recording solutions.

Auto Login – Privileged Session Manager access can be configured for either interactive or automatic login. Auto login enhances security and compliance by never exposing the account credential to the user. This capability can be further enhanced by implementing Privileged Password Manager to the same appliance.

Simple Workflow – Authorized users simply select the resource or account to which they need to connect—the list each user sees shows only the items that user is approved to request access to. The requestor specifies the expected duration of the session, the reason for the request and, if required, a ticket number that can be integrated with an existing ticketing system.

Full-session Audit, Recording and Replay – All session activity—every action that takes place on the screen, including mouse movements and clicks as well as typed characters—is recorded and is then available for forensics and compliance review using DVR-like controls.