Products

Solutions

Education & Training

Services & Support

Partners

Company

{{search ? 'Close':'Search'}}

Layer7® Privileged Access Management

(formerly CA Privileged Access Management)

The Keys to the Kingdom—Are You Protecting Yours?

2018 Gartner Magic Quadrant for PAM

Related Videos


| OVERVIEW

Protect your business and empower your people.

With the explosion of virtualized and cloud environments, the attack surface and number of identities that can be compromised have increased exponentially. As a result, targeted data breaches and insider threats are on the rise. The common theme for many of these attacks is privileged accounts because they hold the “keys to the kingdom.”

Layer7 Privileged Access Management (formerly CA Privileged Access Management) is designed to prevent security breaches by providing granular authorization of users to systems and accounts, constantly monitoring privileged activity to assess for risk, triggering automated mitigations when higher risk is detected, auditing and recording attempts to access as well as vaulting and rotating the privileged account’s credentials including passwords or key/token-based authentication.

Click to watch video

CA Point of View on Privileged Access Management [0:42]

What is privileged access management?

Privileged access management is the creation and enforcement of controls over users, systems and accounts that have elevated or “privileged” entitlements—examples: admin or root accounts, application accounts. While the creation of these accounts is often governed by companies, the use of these accounts is far too often shared across multiple individuals within the company. These are commonly referred to as shared accounts.

Many public breaches are due to the compromising of privileged accounts. External hackers and insider threats seek out and exploit shared or privileged accounts because of the entitlements they hold as “keys to the kingdom.”

| CAPABILITIES

Click to watch video

Privileged Credential Vault

Provides foundation for combating data breaches and insider threats by centrally managing and protecting access and usage of privileged accounts.

Click to watch video

Session Recording

Captures video coverage of all privileged user activity to provide accountability and forensic evidence of accidental or malicious actions.

Click to watch video

User Behavior Analytics

Continuously monitors real-time activities and assesses risk to quickly detect abnormal behavior and triggers automated mitigation to defeat the attack sequence.

Click to watch video

Fine-Grained Access Control

Enforces host-based access controls to provide an extra layer of security for your most mission-critical servers, sensitive data and applications.

| USE CASES

Combat Insider Threats and Targeted Breaches

Despite the many headline-making incidents in recent years, reported data breaches and insider attacks continue to rise. Stealing and exploiting privileged accounts is a critical success factor for many of these breaches.

Consumer and Privacy Protection

Governments and regulatory bodies are mandating that enterprises implement increased controls and auditing over privileged access to secure sensitive consumer data against sophisticated external attacks.

| WHY CA

Layer7 Privileged Access Management is a game-changer.

Low Total Cost of Ownership

Bundles enhanced features in base offering and requires less infrastructure to scale or for session recording.

Quick Time-to-Protection

Software-based appliance that is self-contained, installs very quickly and is easy to use and maintain.

Enterprise Scalability

Protects thousands of resources and supports a large number of concurrent sessions from a single appliance.

As a natural fit for most medium to large-sized organizations with complex PAM requirements, [Layer7] PAM provides native integration with [Layer7] IAM suite to offer additional value.

Source: KuppingerCole Leadership Compass: Privileged Access Management, March 2019

[Layer7 Privileged Access Management] has among the most efficient and scalable PSM capabilities that can handle more simultaneous connections than any other product evaluated.

Source: 2018 Gartner Magic Quadrant for Privileged Access Management

Read user reviews from the tech community.

The interface is very friendly, colorful, and bold

It has a really good scalability attribute, where you can continuously keep dumping on new users and giving them only the access they need on the projects that they would view.

Alan Ng, Information Security Analyst, ITG

Source: IT Central Station

Stability is solid as a rock

This solution really makes a big difference. It has been invaluable to us already.

Susan Donelly, Information Security Manager, United Parcel Service

Source: IT Central Station

It will provide us with more security

It gives you list of servers, so you can see which users have access to which servers. This is really useful, so we can make sure nobody is getting extra access than what is needed.

Program Manager, Financial Services Firm

Source: IT Central Station

Want to learn more about combating insider threats and targeted breaches?

Get more. Do more.

Find answers and share knowledge with your peers through interactive forums.

Troubleshoot technical issues, browse the latest product documentation and access support announcements.

Leverage the knowledge of CA Services professionals to get more from your CA solution.

Sharpen your skills with training, certifications and resources that can transform your company and career.

Get in touch with CA.