balasys-triangle-leftbalasys-triangle-left

Type your search criteria

see-behind
explore zorp
the number one multi-purpose proxy gateway
use case

safeguard

Securely store, manage, record and analyze privileged access
Take the stress out of protecting your privileged accounts by securely storing, managing, recording and analyzing privileged access with One Identity Safeguard. Available as a hardened appliance with an intuitive interface, Safeguard can detect and halt unknown threats while satisfying your auditors and admins. It is an integrated solution that combines a secure hardened password safe and a session management and monitoring solution with threat detection and analytics.

Why do you need api securiy?

reQUEST PRICE
Separation of critical systems
use case

features

contact sales
granular protocol control
Full interpretation and validaton of 20+ network protocols
Connection handling on application layer
Control of protocol channels ( e.g. file transfer, port forward)
comprehensive encryption support
control of SSL / TLS-encrypted protocols
TLS 1.3 cryptography support
SSL and IPSec VPN
use case

product family

request Trial
safeguard for privileged passwords
One Identity Safeguard for Privileged Passwords automates, controls and secures the process of granting privileged credentials with role-based access management and automated workflows. more...

The user centered design of Safeguard for Privileged Passwords means a reduced learning curve. Plus, the solution enables you to manage passwords from anywhere and using nearly any device. The result is a solution that secures your enterprise and gives your privileged users a new level of freedom and functionality. less...

Safeguard for Privileged Sessions
With One Identity Safeguard for Privileged Sessions, you can control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. more...

Content of the recorded sessions is indexed, which makes it easier to locate session events later and helps simplify and automate reporting, both functionalities that ease your audit and compliance requirements. Safeguard for Privileged Sessions serves as a proxy and inspects the protocol traffic on the application level and can reject any traffic that violates the protocol or the channel policy. As a result, it also functions as a granular access control tool. less...

safeguard for privileged analytics
With One Identity Safeguard for Privileged Analytics, you can put user behavior analytics to work for you and know which privileged users present the most risk, discover previously unknown internal and external threats, and find and stop suspicious activities. more...

Safeguard for Privileged Analytics ranks the potential risk level of threats so you can prioritize your response – take immediate action on the most imminent threats – and ultimately prevent data breaches.less...

use case

features

DOWNLOAD DATASHEET
Policy-based password release
Using a secure web browser with support for mobile devices, you can request access and provide approval for privileged passwords and sessions. Requests can be approved automatically or require dual/multiple approvals based on your organization’s policy. So, whether your policies consider the requestor’s identity and level of access, the time and day of the request, and the specific resource requested – or all of these — you can configure One Identity Safeguard to meet your customized needs. Plus, you can input reason codes and/or integrate with ticketing systems.
approval anywhere
Leveraging One Identity Starling Two-Factor Authentication, you can approve or deny requests from anywhere – and with nearly any device -- without being on the VPN
change control
Supports configurable, granular change control of shared credentials, including time-and last-use-based, and manual or forced change.
granular access control
Full support for SSH, Telnet, RDP, HTTP(s), ICA and VNC protocols. In addition, security teams can decide which network services (e.g. file transfer, shell access, etc.) within the protocols they want to enable/disable for administrators.
Full-session audit, recording and replay
All session activity – down to the keystroke, mouse movement, and windows viewed – is captured, indexed, and stored in tamper-proof audit trails that can be viewed like a video and searched like a database. Audit trails are encrypted, time-stamped and cryptographically signed for forensics and compliance purposes.
Full-text search
With its Optical Character Recognition (OCR) engine, auditors can do full-text searches for both commands and any text seen by the user in the content of the sessions. Security teams can search for specific events across sessions and play the recording starting from the exact location the search criteria occurred. It can even list file operations and extract transferred files for review. The ability to search session content and metadata accelerates and simplifies forensics and IT troubleshooting.
command and application control
Safeguard for Privileged Sessions supports both black listing and white listing of commands and windows titles. Predefined blacklist could include risky commands or texts in a text-oriented protocol, or suspicious window titles in a graphical connection. In the case of detecting a suspicious user action, Safeguard can send you an alert or immediately terminate the session.
user behavioral biometrics
Each user has its own idiosyncratic pattern of behavior, even when performing identical actions, such as typing or moving a mouse. The algorithms built into Safeguard for Privileged Analytics inspect these behavioral characteristics captured by Safeguard for Privileged Sessions. Keystroke dynamics and mouse movement analysis not only help you identify breaches, but also serve as a continuous, biometric authentication.
discovery
Quickly discover privileged accounts or systems on your network with host-, directory- and network-discovery options.
one identity hybrid subscription
Expand the capabilities of Safeguard with the One Identity Hybrid Subscription, which offers immediate access to cloud-delivered features and services. These include all-you-can-eat Starling Two-Factor Authentication to protect Safeguard access and Starling Identity Analytics & Risk Intelligence for Safeguard to pre-emptively detect risky users and entitlements. A single subscription enables all One Identity solution deployments.

Benefits

See Safeguard Benefits:

Protect against privileged ID theft and privileged insider misuse

Identify high-risk privileged users, risky behaviors and unusual events

Easier compliance with efficient audit reports

Faster incident response, IT troubleshooting and forensics

Simplified, yet comprehensive privileged account management

No changes to privileged user workflows

Quick ROI with simplified deployment and management

use case

iot security

IoT elements are exposed to be attacked permanently, so they need
solid security tools which can cut risks back to as little as possible.
In a world where everything joins networks, even networks too, you
need a tool to make these increased connections organized.
Button Text