Xton Access Manager Product Update 2.3.202002092319
Today we released new update to the Xton Privileged Access Manager software. This update adds active behavior analytics component to monitor, log and automate management of suspicious and undesired user activities. The update also adds support to record clipboard and file transfer events during sessions made using native RDP clients.
Added active behavior analytics
This update adds active behavior analytics component to monitor, log and automate management of suspicious and undesired user activities. The component monitors network for too frequent access to sensitive data, excessive content download from managed end-points, uploading large binaries to critical infrastructure or high rate or execution of management functions. The active behavior analytics component sets in invisible watch guard that controls access to privileged resources yet does not interfere with the routine administrators activities.
Active behavior analytics component is capable to record violations in the defined network policies, terminate active sessions to remote servers following rule violation of the associated profile, block a suspected account from performing further actions with privileged access or reset passwords of the affected assets.
Active behavior analytics rules are enforced automatically based on the behavior profiles configuration. The behavior management component allows to block malicious actors from performing undesired activities when taking advantage of granted or assumed privileged access.
Added recording for RDP Proxy clipboard and file transfer events
This update adds support to record clipboard and file transfer events during sessions made using native RDP clients with the option to capture content of transferred files and clipboard. The option brings the functionality available for a long time for in-browser and SSH Proxy sessions to the remote Windows access established using native RDP clients such as MS mstsc, mobile RDP clients, mRemoteNg, etc. Clipboard and file transfer events capture event time, user, transferred content size, the remote server information and also the content (clipboard or the file) itself for the further investigation. Automatic purge option is available for file transfer events based on the configured retention time.
Added the option to temporarily block users
The update introduces the option to temporarily block users as a quick way to restrict privileged access without modifications in the permission architecture. The option could be used to suspend and then quickly resume user access during vacation breaks or following behavior monitoring profiles enforcement until further investigation. The block option is available for all system users regardless of the source user directory (local, MS Active Directory, eDirectory, etc)
Please review key features documentation and product news using the links below
- Behavior Profiles and Event Analytics
- How to configure JumpCloud LDAP-as-a-Service Integration with XTAM
- What State and Local Governments need to know about Privileged Accounts
- XTAM Password Vault Free Trial Download
- Xton Access Manager User Manual
- Getting Started Guide
- Xton Technologies News and Events
- Xton Access Manager How-To Guides
- Explore Our PAM Features and Highlights
- Explore a pre-configured live demo in our environment
- Best Practices Guide provides insights into both Concepts and Design elements for users looking to build out their PAM deployment
The software requires about five minutes to install on a freshly built Windows or Linux server or desktop with 1+ Gb RAM and no pre-requisites. After installation, please follow our Getting Started Guide for step-by-step introduction to the application.
Read the product documentation including Windows and Linux installation instructions as well as Getting Started Guide: https://www.xtontech.com/resources/documentation/
Follow this link for the instructions how to update the existing setup: https://www.xtontech.com/resources/faq/updating-xton-access-manager-version/
Check the software pricing, including options and licensing FAQ: https://www.xtontech.com/store/
We appreciate your feedback and comments about Xton Access Manager and also about handling privileged accounts, passwords, keys and certificates as well as sessions to remote computers in general.
Thank you for your interest in our product.
Xton Technologies team
Xton Access Manager for Privileged Access Management (PAM) provides complete, control for your privileged passwords, secrets, certificates and documents to meet audit requirements while limiting your risk of security breaches. It’s easy to install, affordable, cloud-ready and offers unlimited use and storage
Please fill out this form to receive a download link to get started today, even on your current desktop or laptop. Documentation is available to help or you can email or call us to request a trial extension, discuss questions and share your feedback. We would love to talk to you.
The Featured images for this article is Vectors by Vecteezy and
Background vector created by photoroyalty – www.freepik.com