Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
Discover privileged accounts on Windows, Linux, and Mac systems, devices, databases and applications.
Share admin and firecall accounts with complete control and auditing. Link access, actions to individuals.
Manage Windows domain, service, and local accounts. Manage the dependencies of service accounts.
Eliminate hard-coded passwords embedded in configuration files, scripts, and code through APIs.
Launch secure, remote sessions in a single-click without copying and pasting the login credentials.
Grant remote access to devices and applications without showing the passwords to users, third-parties.
Integrate with Active Directory for user authentication, onboarding and automatic offboarding.
Enforce password request-release approvals for IT staff. Automate reset after time-limited access.
Ensure Zero Standing Privileges (ZSP) and grant specific rights to specific users on specific hosts.
Eliminate local admin privileges on endpoints and seamlessly elevate applications for standard users.
Excellent tool for securely storing passwords, SSH keys, and other credentials. It provides an easy-to-use interface to managing password access permissions (sharing), and a quick way to view who has access to specific passwords.
I also find their support team to be excellent. They are quick to answer questions, and they have also released updates to the product to specifically address a feature that we needed. They are great to work with.
Executive Sponsor in Legal Services
The system does exactly what it needs to. The team behind it is stellar and has been very responsive in expanding the API to cover a number of custom scripting points.
Executive Sponsor in Information Technology and Services
Small-Business(50 or fewer emp.)
As a managed service provider, I needed a way to centrally and securely store the credentials we use to manage our customers environments. Securden Password Vault enables me to do this with all of the granular access control, multi-factor authentication and access reporting that I need. I am very pleased with the product and would recommend it to any managed service provider looking to maintain a central credential store. The password policy, which includes both strength and duration of passwords, with the ability to generate a password that meets the policy is also very powerful. This central store, accessed from anywhere with an internet connection and also from a mobile app has enabled us to realise our goal of not communicating passwords over email or storing passwords in insecure locations.
North Sydney Council
Great product with outstanding support, and this is what makes the secret recipe.
We have been utilizing and implementing Securden over the past year and this product has provided us with a way to allow our end users to run programs and features with administrative credentials without being a full blown administrator on the machine. This has been a great way to minimize the security risk in our environment.
Senior Network Security Engineer
Small-Business(50 or fewer emp.)
I got answers for every question, during trial and afterwards. Support was fast and efficient. PAM got our own passwords safe and gave us a single, centralized way to manage customers' passwords and remote access through a single interface. Price tag is very good as well.
After trialling several different password managers, we shortlisted Securden as the only one that was able to manage our requirements in a cost effective manner. The system was easy to install and configure, and is heavily relied on in our organisation. Users find the platform easy to use, and so our adoption rates are very high.
Senior IT Administrator
I like that the database is encrypted and in-house. We really didn't want to store anything in the cloud, much less any of the major brands that seem to be hacked more which we didn't want any part of.
Great backup support and good value for smaller companies.
It is always nice to hear that you are doing the improvements with a great devotion. Securden is a good product and we are happy customers :)
We are loving this system, extend my praise to your entire team!
System Administrator, Active Directory Expert
The software has a super-clean interface, pretty slick, and is easy to understand. The product is pretty deep in functionality and I really just scratched the surface on what it can do and how well it works.
Over 80% of security breaches involve stolen credentials and exploitation of privileged access. Securden PAM strengthens privileged access security and secures your infrastructure from internal and external threats.
Store, manage and control access to all privileged accounts, including passwords, keys, certificates, and documents from a central database. Prevent identity thefts and unauthorized access to credentials.
In the absence of centralized management, privileged accounts are left uncontrolled and unmonitored resulting in chaos. Consolidate accounts, establish access controls, enforce policies, eliminate system lockouts, and improve the efficiency of IT teams.
Industry and government regulations mandate controlling and continuously monitoring privileged access. Ensure and demonstrate compliance to various regulations by enforcing policy-based controls, audit trails and reports.
Securden helps you gain centralized control over admin passwords and complete visibility over privileged access with an easy-to-use, simple to deploy and a highly affordable solution.
Discover, consolidate and securely store all your privileged accounts in a centralized vault. Organize accounts into folders reflecting your company's hierarchy.
Securden's discovery engine scans your network and discovers systems (Windows, Linux and Mac), databases (MySQL, PostgreSQL, Oracle and MSSQL) and network devices. It also imports the privileged accounts from the systems and devices. In the case of Windows, Securden fetches local admin accounts, domain accounts and service accounts on member servers. It also traces the dependencies of service accounts.
You can organize accounts in nested folders reflecting the organizational hierarchy with the flexibility of assigning permissions at any level. Sensitive data are encrypted using AES-256, the strongest known, military-grade algorithm.
Securden PAM stores sensitive data and you can control access to records and privileges to perform various functions within the application based on user roles.
Securden provides five pre-defined user roles with well-defined access scope and privileges. At the application level, the ability to add accounts, change passwords, create and manage users, enforce password policy, export data, view audit trails, generate reports, and change settings can all be controlled through roles.
By enforcing users to authenticate through two successive stages to access their Securden account, you can successfully prevent any possible accidental or intentional unauthorized access to Securden.
Securden's native authentication or Active Directory authentication serves as the primary authentication mechanism. Additionally, users can be forced to authenticate through Google Authenticator or verification code sent to their email address as the second authentication factor. You can selectively enforce any option as the second authentication factor for different users as required.
IT staff on remote locations or client site without access to Securden, can use the secure offline access mechanism.
Securden allows you to export your passwords in the form of an encrypted HTML file for secure offline access. The file could be periodically sent to your email address too. The offline interface is the same as the online interface.
You can open the offline copy using any standard web browser from any device, including mobile devices. As the offline copy is encrypted and the encryption key is known only to you, no one else can access the data.
Unexpected downtime or system crash could take a heavy toll on the business continuity and data security of any organization.
Securden comes with a robust redundancy architecture allowing you to have primary and secondary application servers. If the primary server goes down, users can seamlessly connect to the secondary server and get uninterrupted access to credentials.
It also comes with provision for periodic backup of the database and a smart recovery manager that takes care of a quick recovery in the unlikely event of a database crash.
At Securden, we're fanatical about one thing: Creating amazing products that combine security, simplicity, and affordability. Organizations of all types and sizes - from small businesses to very large enterprises - are relying on Securden for information security. Here's what sets us apart from the rest.
IT security specialists from a UK-based firm performed various penetration tests and concluded that Securden is well-built with a top-notch security model. Learn More.
-- Experts from Agile Infosec, London.
Securden technical consultant will walk you through the important features demonstrating how you can safeguard the keys to your kingdom.