Home Security Keep an eye on privileged users' activities

An update to ManageEngine's Password Manager Pro delivers session recording facilities to track the use of critical systems.

Password Manager Pro allows users of any HTML5-compatible browser to launch emulated Windows RDP, SSH and Telnet sessions, without requiring additional plug-ins or agent software.

It also provides secure storage for passwords and other sensitive information.

Password Manager Pro 6.7 adds the ability to record, archive and play back the actions taken by privileged users during privileged sessions.

The problem, according to Rajesh Ganesan, director of product management at ManageEngine, is that certain users need very broad access to critical resources to do their jobs.

The unspoken concern is that some of these users may be expert enough to cover their tracks after performing unauthorised operations.

So Password Manager Pro 6.7 stores a visual record of those activities in what the company claims is a "tamper-proof archive" which can then be used for forensic audits.

Prices start at $US495 for two administrators, but the premium edition (from $US1195) is needed if the session recording feature is required. A 30 day trial version is available.

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect