Cloud Suite

With Cloud Suite, organizations minimize their attack surface by establishing trusted machine identities and leveraging corporate identities for authentication, implementing just-in-time privilege with MFA, and securing remote access while auditing everything.

Functional

  • Simplifies user authentication to servers from any identity provider, cloud directory, or federation partner including Active Directory, LDAP, Google, Centrify, or Okta.
  • Centrally manages machine identities and their credentials.
  • Quickly secures privileged access for humans and applications with globally defined policies that are centrally managed and enforceable across any environment.
  • Enables to govern privileged access in cloud environment by dynamically distributing policies to elastic infrastructure for enforcement.
  • Multi-factor authentication at login for Linux and Windows systems.
  • Centrally creates and dynamically applies roles and security policies that control privilege across hybrid cloud environments.
  • Automates enforcement of privileged access security policies globally.
  • Delivers MFA for privileged access during system and vault login, password checkout, and privilege elevation with a broad range of built-in and third-party authenticators.
  • Provides a flexible, just-in-time model for privilege access to specific resources.
  • Records, audits, and reports of host-based and gateway sessions. Gives possibility instantly terminate suspicious sessions.
  • Enables adaptive multi-factor authentication (MFA) for IT admins who access Windows and Linux systems, elevate privilege, or leverage privileged credentials (additional option).
  • Leverages user behavior analytics on the base of modern machine learning algorithms to carefully analyze a privileged user’s behavior (additional option).

Implementation

Interval International leverages Delinea to easily Implement least privilege management. Large integration projects and outsourced app development required granular management of privilege. Centrify provides least-access and least-privilege security models for easy implementation across diverse users, systems, and roles.

in detail