Download PDF version Contact company

One Identity, a pioneer in unified identity security, announced the general availability of One Identity Cloud PAM Essentials. This innovative SaaS-based solution will simplify privileged access management (PAM) across the enterprise, with a specific focus on cloud applications and infrastructure.

The surge in cloud migration, coupled with the expansion of the attack surface and the growing sophistication and frequency of cyberattacks, underscores the critical need for effective PAM solutions. By tightly controlling and auditing access to privileged accounts, PAM plays a pivotal role in bolstering an organisation’s security posture and mitigating identity-based attacks.

Comprehensive PAM solutions

78% of them view comprehensive PAM solutions as integral to their cybersecurity strategy

Mark Logan, CEO of One Identity, emphasised the distinct advantage of PAM Essentials: “Unlike existing solutions in the market that often entail long and costly deployments, PAM Essentials can be up and running in minutes, without the need of additional infrastructure investments. This solution can save customers thousands of dollars on implementations, making sophisticated PAM security attainable for even the smallest of organisations.”

Small and mid-sized businesses, which often grapple with limited IT resources, stand to benefit significantly from this solution. According to KuppingerCole, 78% of them view comprehensive PAM solutions as integral to their cybersecurity strategy.

Cyber insurance requirements

The market has been in dire need of a cloud-based solution for Privileged Access Management that is easy to deploy and suitable for small and mid-sized businesses,” said Paul Cameron, Chief Revenue Officer at Intragen.

Many companies are struggling with audit failures and the inability to obtain cyber insurance due to insufficient control over administrator access users. PAM Essentials goes beyond a traditional on-premises solution; it aids in compliance and industry-specific standards, a crucial step in meeting cyber insurance requirements.”

New disclosure requirements

PAM Essentials empowers security teams with robust controls, ensuring only authorised individuals

With its exceptional time-to-value and streamlined management interface, PAM Essentials empowers security teams with robust controls, ensuring only authorised individuals can gain access to sensitive systems and data. The solution provides full visibility into user activities, facilitating proactive risk management through an intuitive user interface.

Brian Chappell, head of product at One Identity, highlighted the solution’s alignment with evolving compliance standards and cyber insurance requirements, stating: “In light of the SEC’s new disclosure requirements and increasingly stringent cyber insurance requirements, PAM Essentials equips businesses to adapt seamlessly. Our goal with PAM Essentials is to provide a scalable, user-friendly solution that instils confidence and peace of mind amidst the dynamic cybersecurity landscape.”

Key features of PAM Essentials

Key features of PAM Essentials include: 

  • Cloud-native PAM functionality: Remote and hybrid security teams can access cloud applications and resources with ease.
  • Sessions-based privileged access: User sessions are monitored, controlled and recorded with remote access via SSH and RDP.
  • Privileged session recording: Structured audit logs, protocol proxy session recordings and isolation of user sessions create a strong forensic trail tracking potential threats.
  • Secured credentials management: Central orchestration of auto-login, timely rotation of passwords and vaulting of local server accounts passwords reduce the risk of unauthorised access.
  • Secure tunnel technology: Eliminates the complexities of traditional network access solutions - with no VPN needed - by being built on zero-trust architecture.
  • Native integration with OneLogin: Extended unified access management via centrally managed PAM Essentials is enabled for OneLogin customers.
  • Flexible: Users can quickly and effectively integrate existing directories and authentication controls.
Download PDF version Download PDF version

In case you missed it

How can the security industry contribute to protecting the environment?
How can the security industry contribute to protecting the environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Dahua Technology showcases "The Road to a Sustainable Future" at Intertraffic Amsterdam 2024
Dahua Technology showcases "The Road to a Sustainable Future" at Intertraffic Amsterdam 2024

Dahua Technology, a world-pioneering video-centric AIoT solution and service provider, made its debut at Intertraffic Amsterdam 2024, displaying a diverse range of ITS solutions ta...

Comprehensive K12 security
Comprehensive K12 security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...