Book Demo!

Your May 2021 XTON Access Manager Newsletter!

We have made several enhancements to the XTAM product. This includes:

  • Removal of User Permission System Wide for Simplified Off-Boarding
  • Batch Secret Extraction using Break Glass
  • Custom Report Delegation for Auditing
  • Bulk Archive and Restore Record Capabilities

Check out our latest blog on MSPs Face Growing Cybersecurity Risks.

Details on all the XTAM updates are below.

System Administrators can now, with a single click, remove a user’s permission to many objects throughout XTAM from the Users report. This permission removal option supports Global Roles and Permissions, Record and Folder Permissions and local Group membership, but excludes the blocked role. This simplifies the off-boarding process and better maintains license enforcement through user count.
Learn More
Using the Break Glass procedure, a qualified person may extract multiple secrets from a single operation to more readily retrieve sensitive information in the case where XTAM is offline or otherwise inaccessible.
Learn More
Custom Reports, created by System Administrators, are now accessible by folder Owners. Previously restricted to only System Admin access, the delegation of Custom Reports allows for increased involvement of additional privileged users in the XTAM Vault and its auditing.
Learn More
Both Archive and Restore options have been added to the Bulk Actions menu to allow for a state change of multiple selected records.
Learn More
Additional XTAM Extensions and Enhancements
Over the past 30 days we have made a number of additional enhancements to XTAM. These include:

  • Multiple SSH proxy, root folder and cache performance optimizations;
  • New Pass-through discovery option for auto-import;
  • Added Full Path location to folder and record selection for easier identification of similarly named objects; and
  • Added support for PEM/OpenSSH private keys for SSH connections and task executions.
Read the Xton blog to stay up to date on all product enhancements.
Fundamentals of Privileged Access
The key to implementing privileged access management strategies is understanding it’s a journey. You can’t run before you walk. Companies need to establish a clear vision and process for moving from core PAM features to advanced capabilities. Read our Fundamentals of PAM to help you get started on your journey.

 
 

Copyright © 2020 Xton Technologies, LLC. All rights reserved.