BeyondTrust PathfinderBeyondTrust
|
||||||
Related Products
|
||||||
About
BeyondTrust Pathfinder offers a comprehensive identity-centric security platform designed to protect enterprises from privilege-based attacks by delivering visibility, control, and governance across human and non-human identities, credentials, and access paths. At the core is the Pathfinder Platform, which dynamically maps paths to privilege across endpoints, servers, clouds, IdPs, SaaS, and databases, exposing hidden over-privileged accounts, orphaned identities, and attack vectors. Other key components include Identity Security Insights for unified detection and risk-based prioritization of identity threats, Password Safe to discover, vault, manage and audit privileged credentials and session activity, Privileged Remote Access for secure, rule-based access with full session monitoring, Entitle for automating cloud permissions and just-in-time access, Endpoint Privilege Management for enforcing least-privilege on endpoints with application control and file-integrity monitoring.
|
About
Centralize your multi-vendor infrastructure into a single security domain. Core Privileged Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. BoKS simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start. Centralize management of user profiles and accounts for simplified administration and scalability. Secure your systems by managing user privileges and access to sensitive data—without slowing down productivity. Give users only the access they need and ensure that least privileged access is enforced across your hybrid environment.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Large enterprises and organizations needing a tool to secure privileged access, manage identities and permissions across complex hybrid and cloud environments
|
Audience
Organizations looking for a software solution for privileged access management on Linux and UNIX
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationBeyondTrust
Founded: 1985
United States
www.beyondtrust.com/products
|
Company InformationFortra
Founded: 1982
United States
www.fortra.com/products/privileged-access-management
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
Privileged Access Management Features
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
Identity Management Features
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
|
||||||
Integrations
No info available.
|
Integrations
No info available.
|
|||||
|
|
|