e-DMZ Security Announces Industry's First Real-Time Session Monitoring And Auditinge-DMZ Security Announces Industry's First Real-Time Session Monitoring And Auditing
TPAM Suite provides users with the ability to manage complete user privilege/access
April 30, 2010
Wilmington, DE / London, UK April 27, 2010 " e-DMZ Security, the market leader in privileged user and privileged access management today announced the release of version 2.3 of its Total Privileged Access Management (TPAM) Suite. The enhanced TPAM Suite provides users with the industry's first real-time session monitoring and auditing capabilities, further enhancing their ability to manage complete user privilege/access by allowing real-time session shadowing and action of active sessions before malicious or accidental events can occur. e-DMZ Security will be providing demos of its enhanced TPAM Suite during Infosecurity Europe, April 27-29, 2010 in London, UK (booth H82).
In addition to active session monitoring and control, version 2.3 enhancements include greater configuration management database integration, increased support of widely distributed architectures through e-DMZ Security's Distributed Processing Appliance (DPA) and a more extensive graphic user interface (GUI) to assist with troubleshooting. Version 2.3 also provides added support for bi-direction file transfer control through Privileged Session Management (PSM) proxy and added platform support for HP Non-stop (Tandem), Palo Alto, Stratus VOS and Open VMS.
"Our customers rely on the TPAM Suite for its flexibility to solve the critical issues associated with compliant privileged control in a modular fashion based on their specific needs," said Scott Hammack, CEO for e-DMZ Security. "By adding real-time 'over the shoulder' session monitoring, we are able to provide our clients with the most comprehensive and scalable privileged access management solution, while maintaining the ease of use they have come to expect."
Built off of the eGuardPost and PAR appliances, the TPAM Suite provides organizations the flexibility to solve the critical issues associated with compliant privileged control in a modular fashion from privileged password management and application password management to privileged session management and privileged command management. By allowing enterprises to add modules and capabilities as they grow, they are able to deploy security solutions that fall within their budgetary constraints while maintaining their compliance with SOX, PCI, HIPAA, GLBA, Basel II and other regulations.
For more information on the TPAM Suite please go to: http://www.edmz.com/tpam.html or email [email protected] (subject: TPAM Suite) or call (866) 203-9823.
About e-DMZ Security
e-DMZ Security is an award-winning provider of privileged access control solutions for today's enterprises looking to control, audit and record privilege sessions such as remote administrators, vendors or privileged internal access. Its Total Privileged Access Management (TPAM) suite is a modular, cost-effective solution for privileged user, privileged identity and privileged access control. Built on the award winning Password Auto Repository (PAR) and eGuardPost appliances, TPAM delivers security and compliance across all market verticals with over 350 installs in over 17 countries world-wide. Customers include many of the world's largest enterprises in banking, insurance, pharmaceutical, manufacturing and more. Headquartered in Wilmington, Delaware, e-DMZ Security has offices and/or authorized partners in North America, South America, Europe, Middle East and Asia.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks