senhasegura

Go Endpoint Manager

GO Endpoint Manager endpoint and workstation privilege management for Windows and Linux

Endpoint security or endpoint protection is an approach to protecting computer networks that are remotely connected to client devices.

Connecting endpoint devices such as laptops, tablets, cell phones, IoT devices and other wireless devices to corporate networks expands the attack surface available to malicious actors.

Endpoint security seeks to ensure that such devices achieve a level of compliance defined by standards.

GO Endpoint Manager allows you to perform functions such as Windows UAC, Run As on local workstations and thus run applications that require privileges, including registration sessions, on Windows and Linux. A local agent can launch applications by automatically entering credentials.

Thus, applications that are authorized to use the privilege escalation are listed in the solution through the previously allowed list and their use is limited to authorized users.

It is also possible to configure the reject list to include unauthorized applications in the environment and map network drives on workstations. Senhasegura also allows the user to provide a token-generated value to authenticate to the device.

Some of the advantages of GO Endpoint Manager are:

GO Endpoint Manager allows to segregate access to sensitive information, isolate critical environments and associate environments with and without correlation.

All requests to use administrator credentials are recorded in session logs, which provides greater traceability of actions and makes it easier to audit privileged activities and actions.

It overcomes the challenges of implementing regulations such as PCI, ISO, SOX, GDPR and NIST with the automation of privileged access controls to achieve maturity in audited processes.

Controlling lists of authorized, informed and blocked actions for each user reduces the risks associated with the installation of malware and abuse of privileges.

Main features for Linux

Integration of Linux logins into group policies. It is possible to verify every authentication performed according to time, calls, authorizations and additional group policies.

An additional layer of security over tools such as ACL, PAM, SELinux and sudo, acting directly as LSM (Linux Security Machines) without the need to recompile the kernel.

It is possible to invoke administrator privileges to execute applications, taking into account the control of the lists of actions authorized for execution.

Recording sudo actions to meet audit requirements.


Execution and automatic access to applications through automation macros with actions predefined by the environment administrator.

To be able to centrally authenticate Linux environment credentials by installing Active Directory profiles.

Main features for Windows

GO Endpoint Manager allows invoking administrator privileges to run applications, taking into account lists of authorized actions to be executed.

Access to Windows Control Panel with administrator privileges, including features such as date and time change functions.

Invoke administrator privileges to access sensitive data shared on the network. Security for files and directories against threats.

Grant and revoke privileged local user access on Windows, Linux, Unix, Databases and Active Directory platforms without the need to install any agent on the target device.

Execution and automatic access to applications through automation macros with predefined actions by the administrator.


A local agent can launch applications by automatically entering credentials.



Makes a Difference

NO ADDITIONAL COST

We offer a full-stack and plug and play platform with the shortest setup time.

CUSTOMER RECOMMENDATION

As a PAM supplier, we received a score of 4.9 out of 5.0 and a 2021 Customer's Choice endorsement.

INTUITIVE USER INTERFACE

We provide less training and support time and cost.

CONNECTORS

It even allows the connection of older devices that can be upgraded by the customer.

FAST DISTRIBUTION

In just 7 minutes, we can configure and deliver the software and hardware architecture at High Availability.

SUPPORT EXPERIENCE

97% of our customers rated our services as Excellent.

Archives

Categories