+
+

Related Products

  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • ThreatLocker
    499 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ManageEngine ADAudit Plus
    483 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • SBS Quality Management Software
    7 Ratings
    Visit Website
  • Digital WarRoom
    55 Ratings
    Visit Website
  • MedTrainer
    241 Ratings
    Visit Website
  • Keeper Security
    1,748 Ratings
    Visit Website
  • Incredable
    9 Ratings
    Visit Website

About

Eliminate local administrator rights on Windows servers and endpoints. Seamlessly elevate applications for standard users. Enforce the principle of least privilege and zero trust with Endpoint Privilege Management. Automate PEDM using policy-based application control. •Eliminate local admin rights on Windows endpoints •Manage applications that require administrative privileges •Define who can access what applications & automate application control through whitelisting & blacklisting •Policy-based access, even for offline endpoints & remote employees •On-demand privilege elevation on online & offline endpoints •Grant temporary full administrator privileged for standard users when required •Track application usage & privilege elevation trends •Continuously monitor local admin accounts & detect if new local admin accounts are created •Ensure compliance with regulations with comprehensive audit trails •Highly scalable and enterprise ready

About

Reduce the risk of insider threats, from malicious attacks to inadvertent threats. Trusted Access Manager for Z helps deliver trusted systems and improve business efficiency through comprehensive privileged access management for your mainframe. By eliminating the need for shared credentials, working with existing tools, and producing forensics on all privileged user activity, you stay in complete control over vital mainframe data. Restrict users who have access to a privileged state and timebox the elevation duration to reduce the risk of insider threats. Simplify auditing by eliminating privileged credential sharing and maintaining a complete line of sight into individual privileged user activities. Maintain complete control of when users have access to the most sensitive data in the business, to deliver trusted systems and operate efficiently. Transform your company and build your career with Broadcom training, certifications, and resources.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT Teams, CIO, CSO, Security Analyst

Audience

Companies looking for a solution to mitigate risk and deepen trust in the identity of users

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Securden
Founded: 2018
United States
www.securden.com/endpoint-privilege-manager/index.html

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/mainframe/identity-access/trusted-access-manager-for-z

Alternatives

Alternatives

WALLIX BestSafe

WALLIX BestSafe

WALLIX Group

Categories

Categories

Integrations

Cisco Duo
Google Authenticator
IBM Z
IBM z/VM
Microsoft Authenticator
Microsoft Entra ID
Okta
OneLogin
OpenText Core Behavioral Signals
Ping Identity
Yubico YubiKey

Integrations

Cisco Duo
Google Authenticator
IBM Z
IBM z/VM
Microsoft Authenticator
Microsoft Entra ID
Okta
OneLogin
OpenText Core Behavioral Signals
Ping Identity
Yubico YubiKey
Claim Securden Endpoint Privilege Manager and update features and information
Claim Securden Endpoint Privilege Manager and update features and information
Claim Trusted Access Manager for Z and update features and information
Claim Trusted Access Manager for Z and update features and information