Quote Image

Remote access is one of the most common pathway used during cyberattacks, and nearly every data breach involves stolen privileged credentials.

Privileged Identity contains cyberattacks that penetrate the network perimeter by securing the privileged credentials needed to gain access to IT assets. It continuously discovers privileged accounts throughout the cross-platform enterprise and automatically randomizes the credentials for each account at substantial speed and scale. Even if a hacker harvests a credential, the threat is contained because the stolen credential is time-limited and cannot be used to further expand the attack in the environment.

Quote Image

Our Privileged Access Management solutions defeat cyber threats by allowing IT and security professionals to control access to critical systems while also managing and securing the privileged credentials for those accounts.

In addition to helping mitigate the damage caused by cyberattacks, Privileged Identity increases the productivity of IT staff. It operates automatically on an ongoing basis to eliminate time-consuming manual IT tasks, such as frequently updating privileged credentials in large enterprise environments.

New Features in Bomgar Privileged Identity

The new version of Privileged Identity enables the following:

  • Integrated Administration: Users can be added in bulk to Group Memberships in both the Privileged Access and Privileged Identity products.
  • SSH keys Injection: With just one click, users can inject SSH Keys managed by Privileged Identity through a Privileged Access session.
  • Enhanced Linux Support: Further scale the product to manage and secure servers in large Linux environments.
  • Enhanced API: Extend Privileged Identity’s APIs to allow automatic rotation of passwords checked in to Privileged Access.

Want to know more? Get more info or request an evaluation today!

Tal Guest

Principal Product Manager

Tal Guest is a Director of Product Management with over 20 years of industry experience. He directs a group of product managers, responsible for expanding privileged access management core capabilities in the areas of remote access and the service desk. Tal also helps establish long-term business strategies based on current/future market conditions and problems faced in the privileged access management area of cybersecurity.