External remote maintenance
External service providers regularly operate on your IS in particular as part of remote maintenance contracts, etc.
Internally, administrators with extended powers can operate on your critical servers.
Your servers contain sensitive data or applications that must be protected to ensure the business continuity and sustainability.
It could be a file management server, radiotherapy equipment within a hospital or a production line.
“A genuine IS security policy includes
traceability and control
of privileged users.“
Why have an
The administration bastion creates a single access for all your connections: internal or external.
That is the assurance you need to manage your sensitive access, but also to ensure your GDPR General Data Protection Regulation compliance.
- Any action on a critical server must be monitored, traced and easily identifiable.
- Anyone with privileged rights must be clearly identified and their access restricted.
Secondary ID Vault
Its secured integrated secondary ID vault enhances the security of access by privileged accounts by not disclosing direct access credentials to critical servers.