Securden Unified Privileged Access Management Features

Discover and Manage Privilege Accounts

How many Privileged accounts does your IT environment have?

Most enterprises possess a shedload of devices, where hundreds of accounts reside inside each of them. It is humanly impossible to have a record of the number and type of accounts. Among these accounts, only some are known and used on a regular basis, while the others are unnoticed and orphaned. Manually tracking them is an arduous and error-prone task. Consolidating and managing them becomes simple with an automated privileged accounts discovery process.

To obtain a comprehensive picture organization-wide, consolidating the accounts under a centralized vault is essential. Securden aids the fundamental step of consolidation with a robust discovery engine that fetches the accounts in servers, databases, and network devices to develop a roster for organized management.

Dormant accounts pose grave threats

Unmanaged accounts always pose significant security threats. There could be scenarios where many accounts might remain dormant, and administrators might not even be aware of their existence. Following are some typical scenarios:

  • Privileged accounts of users who bid adieu to the organization
  • Long-lost Privileged Accounts
  • Unmonitored devices
  • Accounts created for testing purposes
  • Hidden backdoor accounts, which are used to steal sensitive data
  • Accounts that were not deprovisioned after offboarding a third-party contractor or a vendor.

All such accounts should be brought under control and management. But that requires visibility into their existence in the first place. Privileged accounts discovery precisely uncovers all dormant accounts.

Track down all the accounts and take charge

Securden scans your network, discovers devices and all accounts therein, including dormant accounts, and consolidates them for efficient administration. The different types of accounts discovered include:

1. Server Accounts:

  • Windows accounts (local, domain, and service accounts)
  • Linux devices and their accounts
  • Mac devices and the accounts, devices and the accounts thereof

2. Database Accounts

  • Accounts associated with Microsoft SQL Server, Oracle, MySQL, PostgreSQL databases.

3. Network Devices

  • Accounts associated with various network devices such as switches, routers, firewalls, other network devices from various vendors such as Cisco, Juniper, HP, etc.

3. Other Accounts :

  • Active Directory and LDAP-compliant directory services account
  • Privileged accounts used in web services such as ASP.NET config files and SharePoint; and in middleware tiers such as Oracle WebLogic, IBM
  • Privileged accounts used in web services such as ASP.NET config files and SharePoint; and in middleware tiers such as Oracle WebLogic, IBM WebSphere, and SAP NetWeave
  • Cloud identities on platforms including Office 365, Azure Active Directory, Amazon AWS, IBM SoftLayer, Rackspace, and

Strengthen security by randomizing passwords upon discovery

When consolidating passwords from various sources, it is important to ensure that the existing passwords are changed with randomly generated strong, unique ones. This action annuls the passwords accumulated in spreadsheets and text files and offers a fresh start to Privileged Access Management.