Sectona at Infosecurity Europe 2025 | June 3–5 | ExCeL London
Stop by our booth (Stand C 95) for live demo of Sectona’s Modern Infrastructure Access Platform
Strengthening Saudi Arabia’s financial sector through a unified cybersecurity framework ensuring resilience and risk mitigation.
With rapidly evolving technology and the growing threat of cyberattacks, the Kingdom of Saudi Arabia has taken a proactive stance in strengthening the protection of sensitive data, transactions, and public confidence in its financial sector. In May 2017, the Saudi Arabian Monetary Authority (SAMA) introduced the Cyber Security Framework to help organisations effectively identify and mitigate cyber risks. The primary objective of the SAMA Cyber Security Framework is to establish a unified approach to cybersecurity, ensuring that member organisations achieve an appropriate level of maturity in their security controls and manage cyber risks effectively across all operations. The framework clearly defines cybersecurity principles and objectives, structured across key domains – Leadership and Governance, Risk Management and Compliance, Operations and Technology, and Third-Party Management. Within these domains, we have highlighted specific clauses related to Privileged Access Management (PAM).
Clause 3.3.5.4a
Business Requirement
Granting access control only on need-to-have and need-to-know basis.
Clause 3.3.5.4b
User Access Management
Identifying user types across internal staff and third-parties, processing access rights, and periodically reviewing them.
Clause 3.3.16
Threat Management
An approved and well-defined process to identify threats, take appropriate action, and review it regularly.
Clause 3.3.5.4f
Privileged and Remote Access Management
Allocation and restricted use of privileged and remote access, enforcing multi-factor authentication (MFA) as an additional layer of security, and ensuring individual accountability.
Clause 3.3.5.4f.4
Non-Personal Privileged Accounts
Managing the use of non-personal privileged accounts by enforcing restrictions and monitoring, ensuring password confidentiality, and requiring frequent password changes, including after each session.
Clause 3.3.5.4e
Multi-Factor Authentication
Prevent compromise of sensitive and critical systems and profiles.
The Sectona PAM solution is a modern and next-generation platform that integrates multiple capabilities, including password management, MFA, session recording, and threat analytics. Designed to align with customers’ governance and compliance requirements, it enables organisations to achieve regulatory compliance with confidence. The following use cases demonstrate how Sectona aligns with the SAMA Cyber Security Framework.
Clause
Clause 3.3.5.4a
Control
Business Requirement
Granting access control only on need-to-have and need-to-know basis.
How Can Sectona Help?
Clause
Control
User Access Management
Identifying user types across internal staff and third-parties, processing access rights, and periodically reviewing them.
Non-Personal Privileged Accounts
Managing the use of non-personal privileged accounts by enforcing restrictions and monitoring, ensuring password confidentiality, and requiring frequent password changes, including after each session.
How Can Sectona Help?
Clause
Clause 3.3.5.4f
Control
Privileged and Remote Access Management
Allocation and restricted use of privileged and remote access, enforcing multi-factor authentication (MFA) as an additional layer of security, and ensuring individual accountability.
How Can Sectona Help?
Clause
Clause 3.3.5.4e
Control
Multi-Factor Authentication
Prevent compromise of sensitive and critical systems and profiles.
How Can Sectona Help?
Clause
Clause 3.3.16
Control
Threat Management
An approved and well-defined process to identify threats, take appropriate action, and review it regularly.
How Can Sectona Help?
Sectona provides a platform that is easy to deploy, use, and maintain. Updates take minimal downtime, do not require identity-specialist skills, and keep your business running without interruptions.
Faster go to market times for customers
More scalable than traditional solutions
Solutions by Industry
Products
Resources
Customer Resources
Technical Support
Solutions by Industry
Products
Resources
Customer Resources
Technical Support
Solutions by
Industry
Products
Resources
Customer Resources
Technical Support