Book Demo!

Xton Access Manager

Remote Access Gateway

Download Now

Secure Access Control over your Network and Cloud

Remote Privileged Access (especially IT Admins) employees and contractors need secure access to your network and accounts, including Windows, Unix, internal Web Sites, AWS or Azure Instances, Mainframes, Cisco and Juniper Network Devices or Web Management Portals, in order to maintain your business. However, granting access to your trusted users, both inside and beyond the firewall, can also open the door to bad actors gaining access to your critical infrastructure.

With Xton Access Manager, you can securely lock your systems and secrets behind your firewall and use XTAM (with secured Active Directory logins, MFA, Approval and Time-based Workflows) to safely provide access to only those trusted personnel. Layered with Audit Trails, Video Recording and Notifications, you can be confident that your infrastructure will remain secure from threats.

XTAM Hybrid Access Security Broker Architecture
With XTAM’s Remote Access Broker you can:
Maintain your infrastructure safely behind your firewall
Retire your slow, aging VPN for a secure, modern Web Access & Management Portal
Ensure your employee and contractor access is secure with AD, SSO or MFA
Monitor, join, terminate and record access to your systems
Access Windows, Unix, AWS, Azure, Network Devices, Web Portals, Mainframes, Privileged and Shared Accounts and Applications
Configure notifications when your systems are accessed
Continue using native SSH clients like PuTTY or SecureCRT
Generate and share audit logs and reports about user access and activity
Enable approval, time or location based workflows to limit remote access
Use a simple, intuitive web portal with no agent requirements

Download Now

Provide Secure Remote Access with Web or Native Client Support

Establish browser based secured access to remote desktop or shell terminals allowing employees or outside partners safe, secured and monitored access to devices inside your network.

XTAM also supports the secure use of native desktop client applications like PuTTY, SecureCRT and WinSCP, including SSH Proxy and SSH Tunnel options.

In addition, XTAM can facilitate secure connections to Web Sites or Web Management Portals without disclosing the required login credentials using common browsers like Internet Explorer, Chrome, Firefox and Safari.

Download Now

PAM Privileged Session Management

Easily Share Access to your many Servers, Devices and Portals

Access computers (Windows, Unix, AWS Instances, Azure, Mainframes), Network and IoT Devices (Cisco, Juniper, etc), Web Sites (like Salesforce, Office 365), Web Admin Portals (Firewalls, Routers, ERP systems), Privileged Accounts (Administrator, Root) using standard RDP, SSH, Telnet, VNC and HTTPS protocols.

Download Now

XTAM PAM Vault Security and Permissions

Secure Personal User Access with AD, SSO or MFA Authentication

Protect your shared systems and accounts by associating users and contractors with specific logins. Also, through the use of Multi-Factor Authentication, you can be sure that access is only possible by authorized individuals.

Download Now

Access Control Broker Multi-Factor Authentication (MFA)

Limit Access by Account or System using Configurable Control Policies

Enforce greater control by implementing policies that limit access using parameters like time of day, physical locations (as determined by IP address), days of the week (workdays) or other combinations.

Download Now

XTAM PAM Vault and Customer Reports

Approval Workflows for Enhanced Security & Controlled Access

Configure and implement approval workflows (also known as Dual Control, Four-Eyes or Peer Approval) to your privileged records to enable additional security. This includes options for Emergency Access, multi-step Approval Processes, Auto- or Group-Approval, Access Restrictions and Required Comments or Reasons.

Download Now

XTAM PAM Customer Workflow Request

Audit Trails and Reporting to Ensure Compliance

Fully embedded auditing for all access and activity events. Understand exactly what, when and by whom your systems, computers and devices were accessed. In addition, simple integration with 3rd party SIEM systems using the syslog protocol is available.

Access Controls for Cloud-based Datacenters

When transitioning to a Cloud datacenter the traditional concepts involving firewall and perimeters disappear. All IP addresses are either public or shared with someone else in the boundaries of your huge datacenter. Access Broker is the way to recreate this perimeter. Simply block access to all resources from all locations and all people, but permit only XTAM to access your critical endpoints. This forces employees, contractors and vendor to use XTAM to access your cloud infrastructure which enforces security, control and auditing.
Access Control Broker for Cloud Datacenters
Download Now

Access Recording

Record all remote access activity including video, keystroke and file transfers to remote computers for regulatory compliance.
XTAM PAM Vault Session Recording

Alerts & Notifications

Never be left in the dark again. Setup alerts and notifications to be aware when users are sharing, accessing or working with your systems.
XTAM PAM Vault Alerts and Notifications

Monitor, Observe, Join or Terminate Active Sessions in Real-Time

Join live sessions to observe user activity on remote computers, share knowledge, assist with troubleshooting or simply monitor user activity.

Access Support includes RDP, SSH, VNC, Telnet and HTTPS

Connect to remote computer and WEB endpoints using a variety of the most popular and standard protocols.

Iron Clad Security

A fully secure AES-256 encrypted Identity Vault maintains total control over all your accounts, secrets and records. A provided master password ensures a “break glass” operation can be performed in an emergency. Your sleep just became a lot more peaceful.
Download Now

HTML 5 Compliant
Based on the latest web standards, it runs smoothly in all modern day browsers, including mobile and tablet devices.
No Agents, Extensions or Applets
Requires only server side installation. No agents are required for any operation on the server or client side.
AD and Multi-factor Authentication
Enhance your security by integrating with Active Directory or MFA authentication from the most popular providers like Google and Duo Security.
Unix or Windows Hosting
The application components could be installed on any modern Windows or Linux computer.
Multiple RDBMS support
Keep encrypted application data in the embedded database or MS SQL, Oracle, MySql or PostgreSQL database.
AES-256 Encryption
Data in the identity vault is encrypted with AES-265 based encryption. For additionally security, the application can store the master key on a computer separate from the main application or from the application database.
High Availability Option
The system components could be installed on multiple nodes across computers, connected through a load balancer, to ensure that failure of a node will not impact system availability.
The system components could be installed on multiple computers to increase performance. The system supports multiple WEB Front Ends, session managers and job engines to process tasks like discovery, password reset or script execution.

Download Now

Related Modules

Account Management
Protect your privileged accounts from being shared or abused by inside and outside threats.

Learn More ›

Session Management
Restrict, observe and record privileged sessions, block rogue operations from being executed and create a full audit trail of events.

Learn More ›

Job Management
Define policies that will automate password resets and repetitive administrative activities and jobs.

Learn More ›


Copyright © 2020 Xton Technologies, LLC. All rights reserved.