Book Demo!

Your January 2021 XTON Access Manager Newsletter!

We have made several enhancements to the XTAM product. This includes:

  • Amazon AWS CLI Proxy Support for Zero Trust Connections
  • VMWare vSphere WEB Portal Proxy Support
  • Reconciliation Account for Unix Records
  • Remote Worker Nodes for Multi-Master Deployments
  • Restrict Access using the XTAM SSH Proxy Tunnel

Check out our latest blog on Cybersecurity Trends for 2021.

Details on all the XTAM updates are below.

You can now configure XTAM to support zero trust connections for the Amazon AWS command line tool. This new proxy allows for the secure sharing of privileged access to an AWS infrastructure without sharing the AWS keys. Additionally, the XTAM AWS CLI Proxy respects role-based permissions, configured access request workflows including time-, location- and approval-based access, as well as API Token expiration and location validation for greater control and auditing of its use.
Learn More
The XTAM HTTPS Proxy now supports zero trust access to your VMWare vSphere portal. Allow Administrators and Contractors external access to your internal vSphere portal without compromising or disclosing sensitive credentials. Enforce permissions, workflow-based access restrictions and optionally record their session to ensure audit and compliance standards are met.
Learn More
A new Record Type and Feature were introduced to support the concept of a Reconciliation Account for Unix Host records. When the XTAM record fails its status check, indicating the possibility that the password is no longer valid, the XTAM Job Engine will automatically use the Reconciliation Account on the record to reset the invalid password and bring the record back into compliance. Additionally, the Reconciliation Account can have its own password reset policy as needed.
Learn More
XTAM deployments can now support the option for remote worker nodes to service multiple master nodes. This allows organizations to architect an efficient access network servicing assets hosted as the same cloud datacenter to independent clients. MSPs will realize this benefit by providing access to assets of multiple clients hosted at the same datacenter to several internal or external groups.
Learn More
Further restrict access using the XTAM SSH Proxy Tunnel to only permitted server and ports in a destination network to strictly control tunnel options for specified point-to-point communications. The Allowed Hosts and Allowed Ports can be defined as needed on a record by record basis.
Learn More
Additional XTAM Extensions and Enhancements
Over the past 30 days we have made a number of additional enhancements to XTAM. These include:

  • Added the option to save My Access Requests filter.
  • Added several new remote session keyboard layouts.
  • Improved appearance of Inventory and Session reports that contains large amounts of data.
  • Included an option to combine multiple email notifications into fewer deliveries.
  • Improved the overall performance of system exports.
Read the Xton blog to stay up to date on all product enhancements.
Privileged Escalation
Cybersecurity is paramount for federal and state governments. Yet, recent reports show that governments struggle with privileged escalation. Privileged access management software can help address key issues around privileged access. Read our tips on how PAM can help with discovery, auditing, offboarding and implementing least privileged approaches. Read Article

 
 

Copyright © 2020 Xton Technologies, LLC. All rights reserved.