Sectona Tech Overview
Sectona Tech Overview
Sectona Tech Overview
Management
Tech Overview
Tuesday, November 17, 2020
Agenda for next 30 mins
• Sectona Snapshot
• How Sectona is disrupting a large market-space
• Use-cases we focus on
• What sets us apart
• Who we have worked with
CONFIDENTIAL 2
we deliver
modern + integrated + full stack
CONFIDENTIAL 3
Why Legacy Privileged Access has Failed to Deliver
Problems we help enterprises with
Attribute
Groups
USER ACCESS
Static
Rules
REDUCE TIME FOR INTEGRATION MANAGE DEPENDENT SERVICES LEVERAGE CONTINOUS DISCOVERY AT SCALE
With auto-onboarding capabilities and modular Don’t limit account onboarding, dynamically Leverage deep AD integration capabilities to
discovery settings, onboard assets & accounts onboard dependent services & manage work with assets & users managed via Active
based on pre-defined schedule. passwords on dependent windows services. Directory.
CONFIDENTIAL 5
How Cross-Platform Session Management Works
Session Management
HOW IT BENEFITS
Monitor Sessions from all sources
LAUNCHER
ISOLATED PRIVILEGED SESSIONS
CLIENTS
Web Proxy
Use our virtual RDP & SSH technology
DIRECT
CONNECTIONS combined with support for terminal server
WEB APPS
integrated be assured of end points
PRIVATE CLOUD
isolated from critical environment.
SECTONA CROSS-PLATFORM BRIDGE
SCALE & GROW
PASSWORD VAULT SESSION LOGGING & RISK SCORING
Scale more privileged sessions capacity
using integrated proxies across sites or in
same zone and not your PAM infrastructure.
CONFIDENTIAL 6
Bye Bye VPN. Hello Smart Privileged Access
Remote Access Management
Support Partner
SPECTRA
Business Partner
INVITE REMOTE USER EFFORTLESSLY INTEGRATED MFA & 20 + OTB CONNECTORS SECURE BY DEFAULT
VPN –Less Privileged Access for users over hybrid Enforce MFA policy for users inside & outside Extend more than RDP & SSH and even business
cloud environments with support for Sectona MFA and including applications.
Google Authenticators
CONFIDENTIAL 7
Smart Collaboration Based Privileged Access
Remote Access Management
GET RID OF THIRD-PARTY SCREEN SHARING AUDIT LOGS OF EXTENDED ACCESS EMBEDDED SECURITY
Secure privileged access environment by Record every access extended to users within or No agents needed and data sharing is enabled in
reducing internet access of privileged access outside the environment. the sessions
workstation and inviting external users
CONFIDENTIAL 8
Reduce Risk with Embedded Session Analytics & Risk Scoring
Don’t stop and just recording privileged session. Analyze threats based on user behavior for all privileged activities
CONFIDENTIAL 9
Actionable Insights for Managing Privileged Password Compliance
Be in control of password compliance with continuous verification and reconciliation
CONFIDENTIAL 10
Leverage Modern Service Based Architecture
Reduce resource overheads for deployments
CLIENT ACCESS
LAYER NATIVE RDP NATIVE SSH BROWSER CLIENT
WEB SESSION
PROXY
CONFIGURATION JUMP SERVER Extend PAM policy by leveraging self managed
DATA
Terminal Servers
JUMP HOST
SERVICE
SESSION REPLICATION
PROXY SERVICE
SATELLITE VAULT
RDP DIRECT
PROXY
SATELLITE
VAULT SERVICE
CONFIDENTIAL 11
What Makes Us Different
Our PAM solution is modernly architected with technical & operational considerations to ensure signification resource reduction
Cloud Scale & micro services-based architecture Simplified Licensing Model with flexibility to add
delivered in collaboration with Oracle Embedded unlimited assets reducing future purchase cost for
Version licensing
TECHNOLOGY OPERATIONAL
Cross platform technology which supports Session Support in technologically feasible integration of
management using Direct Connections, Over applications’ privileged user monitoring as part of
Browser and Jump Server & Virtual Browser Session standard support cost
TECHNOLOGY OPERATIONAL
Integrated Proxy & Gateway Server for Session Automation Focus on Discovery of Asset & Accounts
Management which eliminates need for requirement with tighter Active Directory Integration allowing
of additional server) significant reduction on manual activities.
TECHNOLOGY OPERATIONAL
Extensive set of APIs to allow integration with Integrated solution for password Vault & session
complementing technologies recording based on micro services architecture &
embedded database.
TECHNOLOGY OPERATIONAL
CONFIDENTIAL 12
Implement Privileged Access for New Age Infrastructure in Consideration
Solution purpose built to secure hybrid and public cloud infrastructure & workloads
PROTECT
CREDENTIAL FOR
SECURE CLOUD MANAGEMENT CONSOLE MANAGE API ACCESS KEYS & SECRETS DISCOVER CLOUD ASSETS
Protect AWS cloud console logon for root logon Manage & rotate Access keys & security keys Leverage deep integration with AWS and Azure
and IAM users securely and protect with Spectra Digital Vault APIs for discovering cloud workloads and auto
onboarding in PAM
CONFIDENTIAL 13
According Our Customers
Our PAM solution is modernly architected with technical & operational considerations to ensure signification resource reduction
• Coherent & isolated access for users to RDP and SSH Sessions
over browser
'Easy to implement solution with • Higher control over remote user access with actionable
increased visibility & manageability dashboard & insights into all IT assets, accounts, & users of PAM
around internal & external user access' system for better governance
• Customizable & automated password management as per desired
requirements
CONFIDENTIAL 14
We are trusted by
GOVERMENT FINANCIAL SERVICES REAL ESTATE & INVESTMENT BANKING INSURANCE FINANCIAL SERVICES
CONFIDENTIAL 15
Defining new definition of “EASE OF USE”
Sectona is redefining the way you can secure modern privileged access