+
+

Related Products

  • ThreatLocker
    499 Ratings
    Visit Website
  • Keeper Security
    1,748 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    483 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • SBS Quality Management Software
    7 Ratings
    Visit Website
  • Wiz
    1,101 Ratings
    Visit Website
  • MedTrainer
    241 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    587 Ratings
    Visit Website
  • Incredable
    9 Ratings
    Visit Website
  • Digital WarRoom
    55 Ratings
    Visit Website

About

Malicious actors are seeking to compromise large numbers of computers. In many cases attacks occurred across multiple MSPs and Enterprise organizations, affecting all of their clients simultaneously. Forensic analysis of these attacks revealed that they were breached using relatively un-sophisticated methods which could have been avoided with basic endpoint privilege management best practices. Privilege Access Management or “PAM” are solutions that help manage, secure, monitor and restrict privileged access in companies’ environments. Security starts when users are controlled on what they can access on their computer, which is why effective privilege access management is critical. In most cases, privileged users reveal administrative data by mistake. This is why users with admin rights are viewed as the biggest internal threat risk.

About

Eliminate local administrator rights on Windows servers and endpoints. Seamlessly elevate applications for standard users. Enforce the principle of least privilege and zero trust with Endpoint Privilege Management. Automate PEDM using policy-based application control. •Eliminate local admin rights on Windows endpoints •Manage applications that require administrative privileges •Define who can access what applications & automate application control through whitelisting & blacklisting •Policy-based access, even for offline endpoints & remote employees •On-demand privilege elevation on online & offline endpoints •Grant temporary full administrator privileged for standard users when required •Track application usage & privilege elevation trends •Continuously monitor local admin accounts & detect if new local admin accounts are created •Ensure compliance with regulations with comprehensive audit trails •Highly scalable and enterprise ready

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations looking for a powerful Endpoint Privilege Management solution

Audience

IT Teams, CIO, CSO, Security Analyst

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

AutoElevate
www.autoelevate.com

Company Information

Securden
Founded: 2018
United States
www.securden.com/endpoint-privilege-manager/index.html

Alternatives

Alternatives

WALLIX BestSafe

WALLIX BestSafe

WALLIX Group

Categories

Categories

Privileged Access Management Features

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Integrations

Cisco Duo
Google Authenticator
Microsoft Authenticator
Microsoft Entra ID
Okta
OneLogin
OpenText Core Behavioral Signals
Ping Identity
Yubico YubiKey

Integrations

Cisco Duo
Google Authenticator
Microsoft Authenticator
Microsoft Entra ID
Okta
OneLogin
OpenText Core Behavioral Signals
Ping Identity
Yubico YubiKey
Claim AutoElevate and update features and information
Claim AutoElevate and update features and information
Claim Securden Endpoint Privilege Manager and update features and information
Claim Securden Endpoint Privilege Manager and update features and information