Integrated Identity and Access Management & Privileged Access Management
Identity and access management (IAM) plays a critical role in an organization’s IT security strategy. As organizations grow, so do the number of applications, servers, and databases used. Access to the organization’s resources is typically managed through IAM solutions, which offer capabilities like single sign-on, provisioning, user management, access control, and governance. But securing an organizations’ sensitive data and applications requires more. Provisioned users, regardless of privileges, can leave an organization exposed if activity of their usage is not monitored and documented properly.
Identity and access management solutions help IT teams answer ‘Who has access to what?’ But, in order to achieve complete user visibility, privileged access management solutions address the remaining questions: ‘Is that access appropriate?’ and ‘Is that access being used appropriately?’
An Integrated Approach Identity and Access Management and Privileged Access Management
The PowerBroker Privileged Access Management Platform integrates with SailPoint IdentityIQ, enabling organizations to effectively manage user access for both privileged and non-privileged accounts. IT organizations get full visibility into not only role assignments and user access, but also all ongoing user and role activity including asset risk with advanced analytics.
Streamline the Role Delegation Process
Delegate roles in Active Directory or LDAP accounts from SailPoint IdentityIQ into PowerBroker Password Safe, simplifying user administration and system access.
Centralize Role Management
Improve workflow and consistency by managing all user roles through the BeyondTrust Privileged Access Management Platform for least privileged access through Password Safe storage.
Enforce Policies Consistently
Leverage filters in PowerBroker Privileged Access Management Platform to specify when and which policies from SailPoint IdentityIQ should apply to which assets by Role.
Delegate Vulnerability Information
Utilize SailPoint IdentityIQ Roles to control vulnerability management tasks from allowing IT to view assets, run scans, review individual results, deploy patches, and generate vulnerability management risk reports by team.
Review Privileged Access
SailPoint IdentityIQ Roles can delegate privileged access tasks by reviewer, auditor, and rule creator for any platform including Unix, Linux, Windows, and Mac.
Reducing Risk with Privileged Access Management & Identity and Access Management
Complete Role Integration & Import
When a user is added to a role within SailPoint IdentityIQ, membership in this role provides direct access to the PowerBroker Platform, providing controlled privileged access and complete auditing of privileged user activity. The account and its entitlement access data is fed back to IdentityIQ directly via API, providing organizations with complete visibility into user access.
Dynamic Entitlement Export & Reporting
All entitlements granted by the PowerBroker Platform are provided directly to SailPoint via API, providing complete support of out-of-station processes defined in IdentityIQ by including ad hoc reviews of user access as well as automated access certifications.
Automated Safe Enabling API
Direct API-based integration provides immediate provisioning of and visibility into all privileged access. Depending on role membership, users may be granted immediate run time access to request passwords or sessions for managed privileged accounts, and be provided granular least privilege policies. This access is fed back into IdentityIQ allowing an organization complete control of privileged access and visibility down to the keystroke.
Dynamic Activity Audit & Reporting
The PowerBroker Platform provides complete visibility and control of privileged access and extensive reporting, allowing organizations effectively answer: Is that access being used appropriately?
As the fastest-growing, independent identity and access management (IAM) provider, SailPoint helps hundreds of the world’s largest organizations securely and effectively deliver and manage user access from any device to data and applications residing in the datacenter, on mobile devices, and in the cloud. The company’s innovative product portfolio offers customers an integrated set of core services including identity governance, provisioning, and access management delivered on-premises or from the cloud (IAM-as-a-service).
Read the complete Data Sheet!