Company Website

Ratings and Reviews 5 Ratings

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

What is Securden Endpoint Privilege Manager?

Securden Endpoint Privilege Manager (EPM) enables enterprises to remove admin rights without impacting productivity across Windows, Mac, and Linux endpoints. It helps elevate applications for standard users and grants administrator privileges on a Just-in-Time (JIT) basis, eliminating standing privileges while ensuring uninterrupted user productivity. Organizations can enforce strong application control using allowlisting and blocklisting to prevent unauthorized or risky software execution while still enabling required business applications. Securden EPM supports on-demand application elevation and policy-based granular elevation control, allowing IT and security teams to precisely define which applications can run with elevated privileges and under what conditions. Privilege management continues even when endpoints are offline, ensuring protection for remote and traveling users. Temporary JIT local admin rights further minimize risk by granting elevation only when required and automatically revoking it afterward. The platform provides application usage tracking to help refine policies and optimize license usage, along with continuous monitoring of local administrator groups to prevent privilege creep and unauthorized privilege escalation. Built-in secure remote access enables IT helpdesk teams to troubleshoot endpoints without exposing credentials or granting permanent administrative access. Securden EPM also helps organizations meet compliance requirements including HIPAA, PCI-DSS, GDPR, and NERC-CIP. A highly scalable architecture supports enterprise-wide deployments, while a wide array of integrations enables seamless adoption within existing IT ecosystems. The solution also integrates tightly with ITSM platforms such as JIRA, GLPI, Zendesk, ServiceNow, and Freshdesk, allowing privilege elevation requests to be approved or rejected dynamically through existing service workflows, improving governance while maintaining operational efficiency.

What is Core Privileged Access Manager (BoKS)?

Streamline your multi-vendor setup into a cohesive security framework. The Core Privileged Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment by establishing a centrally controlled security domain. This shift enhances your organization's ability to enforce security protocols and regulate access to key systems and data. By offering thorough oversight of accounts, access, and privileges, IT and security teams can effectively prevent both internal and external threats to vital systems before they arise. Centralizing the management of user accounts and profiles simplifies administration and boosts scalability. Protect your systems by carefully managing user privileges and access to sensitive data while ensuring productivity remains high. Assign users only the access they need for their roles, adhering to the principle of least privilege across your hybrid environment to guarantee strong security measures are in effect. This proactive strategy not only strengthens your defenses but also cultivates a culture of security compliance within your organization, ultimately leading to greater resilience against potential security breaches. Furthermore, the integration of such a system encourages ongoing vigilance and adaptability in an ever-changing threat landscape.

Media

Media

Integrations Supported

Active Directory
Cisco Duo
Freshdesk
Freshservice
GLPI
Google Authenticator
IBM QRadar SIEM
Jira
LogRhythm SIEM
Microsoft Authenticator
Microsoft Entra
Microsoft Entra ID
Okta
OneLogin
Ping Identity
ServiceNow
SolarWinds Log Analyzer
Yubico YubiKey
Zendesk

Integrations Supported

Active Directory
Cisco Duo
Freshdesk
Freshservice
GLPI
Google Authenticator
IBM QRadar SIEM
Jira
LogRhythm SIEM
Microsoft Authenticator
Microsoft Entra
Microsoft Entra ID
Okta
OneLogin
Ping Identity
ServiceNow
SolarWinds Log Analyzer
Yubico YubiKey
Zendesk

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Securden

Date Founded

2018

Company Location

United States

Company Website

www.securden.com/endpoint-privilege-manager/index.html

Company Facts

Organization Name

Fortra

Date Founded

1982

Company Location

United States

Company Website

www.fortra.com/products/privileged-access-management

Categories and Features

Application Control

Securden EPM provides comprehensive application control at the endpoint level by utilizing allowlisting and blocklisting techniques. It facilitates temporary access to designated applications via request-release workflows, ensuring a streamlined process. The Securden Audit Engine allows for precise monitoring of application usage. Additionally, it prevents users from downloading and installing harmful applications by implementing strong privilege management protocols.

Endpoint Privilege Management

Securden Endpoint Privilege Manager offers an all-encompassing approach to eliminating administrative rights while ensuring that user productivity and experience remain unaffected. Its powerful workflows allow for the on-the-fly assignment of application-specific permissions to users. Additionally, the system's policies facilitate the automation of privilege management throughout the entire organization.

Categories and Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives

Vault One Reviews & Ratings

Vault One

VaultOne Software