{"id":34671,"date":"2020-12-07T15:06:11","date_gmt":"2020-12-07T15:06:11","guid":{"rendered":"https:\/\/sectona.com\/?page_id=34671"},"modified":"2022-12-28T09:25:00","modified_gmt":"2022-12-28T09:25:00","slug":"secure-remote-privileged-access","status":"publish","type":"page","link":"https:\/\/sectona.com\/secure-remote-privileged-access\/","title":{"rendered":"Secure remote privileged access"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Secure Remote Privileged Access \n<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

Challenge<\/h2>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

Traditional approached that secure remote privileged access using Windows jump servers, SSH bastion hosts and VPNs require management of credentials and heavy network configuration changes. Untrusted endpoints create a massive attack surface for privileged sessions.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

NEED<\/p>

Secure Remote Privileged Access Based on Just-in-Time Policies<\/h2>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t<\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t
\n\t\t\t\t

\n\t\t\t\t\t\n\t\t\t\t\t\tPartner with Confidence\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tManaged service providers can support and secure users accessing from an unknown network with Sectona session management technology.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t<\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t
\n\t\t\t\t

\n\t\t\t\t\t\n\t\t\t\t\t\tTighten Security\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tDe-risk from vulnerable endpoints with isolated privileged sessions via browser and just-in-time access.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t<\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t
\n\t\t\t\t

\n\t\t\t\t\t\n\t\t\t\t\t\tReduce Complexity\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tDe-risk from vulnerable endpoints with isolated privileged sessions via browser and just-in-time access.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

BENEFITS<\/p>

Go Zero Trust for Remote Privileged Access<\/h2>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\"Zero\t\t\t<\/figure>\n\t\t\n\t\t
\n\t\t\t

Zero Trust Access<\/h3>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t

With strong authentication options, JIT policies and workflow support, extend access for the right users at the right time with the right context.\n<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\"Frictionless\t\t\t<\/figure>\n\t\t\n\t\t
\n\t\t\t

Provide Frictionless Experience<\/h3>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t

Enable browser-based access with a single sign-on from any browser and without direct connectivity.\n<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\"Monitored\t\t\t<\/figure>\n\t\t\n\t\t
\n\t\t\t

Monitored Sessions<\/h3>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t

Monitor any or all sessions in a live or historical context with local information and activities performed in a video format.\n<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

Explore the Platform<\/h2>\n

Achieve more with easy to configure integrated components<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\t\t\t<\/figure>\n\t\t\n\t\t
\n\t\t\t

Continuous Discovery<\/h3>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t

Secure privileged accounts with continuous discovery and vaulting<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\tLearn More<\/span><\/a>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\t\t\t<\/figure>\n\t\t\n\t\t
\n\t\t\t

Password Management<\/h3>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t

Manage and rotate passwords and ssh keys with embedded and encrypted vaulting<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\tLearn More<\/span><\/a>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\t\t\t<\/figure>\n\t\t\n\t\t
\n\t\t\t

Session Recordings and Threat Analytics<\/h3>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t

Advanced session monitoring for all privileged activities with risk-profiling and behavior-based analytics <\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\tLearn More<\/span><\/a>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\t\t\t<\/figure>\n\t\t\n\t\t
\n\t\t\t

Account Lifecycle Management<\/h3>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t

Streamline account provisioning, deprovisioning and operations with complete control. <\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\tLearn More<\/span><\/a>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

Next Steps<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

Find how we can help you save resources for privileged access projects.\u200b<\/p>\nContact Us<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"

Secure Remote Privileged Access Challenge Traditional approached that secure remote privileged access using Windows jump servers, SSH bastion hosts and VPNs require management of credentials and heavy network configuration changes. Untrusted endpoints create a massive attack surface for privileged sessions. NEED Secure Remote Privileged Access Based on Just-in-Time Policies Partner with Confidence Managed service providers…<\/p>\n","protected":false},"author":35,"featured_media":49288,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_post_transparent":"disable","_kad_post_title":"hide","_kad_post_layout":"fullwidth","_kad_post_sidebar_id":"","_kad_post_content_style":"unboxed","_kad_post_vertical_padding":"hide","_kad_post_feature":"hide","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_vp_format_video_url":"","_vp_image_focal_point":[]},"_links":{"self":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/pages\/34671"}],"collection":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/comments?post=34671"}],"version-history":[{"count":4,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/pages\/34671\/revisions"}],"predecessor-version":[{"id":53838,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/pages\/34671\/revisions\/53838"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/media\/49288"}],"wp:attachment":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/media?parent=34671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}