Privileged Session Management
Xton Access Manager establishes a secure, interactive session to a remote Windows or Unix device using a standard web browser while optionally providing the access password or certificate from the Identity Vault automatically. It includes this key regulatory ingredient to your IT security tool belt by providing compliance officers the ability to observe in real-time or playback later any previously recorded privileged sessions. Answer all your “who”, “when” and “what” privileged activity scenarios while maintaining the highest level of security.
Create Secure Remote Sessions
Establish browser based secured access to remote desktop or shell terminals allowing employees or outside partners safe, secured and monitored access to devices inside your network.
Record Video Sessions for Playback
Optionally video record sessions to remote computers for future playback to comply with industry regulations, to learn from experience or to investigate incidents. Grant permissions for users to enable sessions with or without recording.
Keystroke and Clipboard Text Event Recording
Always-on keystroke and clipboard logging ensures that all user keystroke inputs and clipboard text are captured for continuous monitoring and enhanced session security.
Join in Real Time or Terminate Active Sessions
Join live sessions to observe user activity on remote computers, share knowledge, assist with troubleshooting or simply monitor usage to ensure compliance and security standards.
Terminate active sessions when foul activity is suspected and then quarantine the record’s access afterwards with permissions so the user cannot return.
Review Session Audit Logs for Compliance
Fully embedded auditing for remote computers’ access including search, filtering and export as well as a syslog API.
Share Sessions without Disclosing Secrets
Provide access to remote computers without disclosing passwords, keys or certificates required to access them. Keep the attack surface low by limiting the number of users with elevated privileges.
RDP, SSH, VNC and Telnet
Connect to remote computers using a variety of the most modern and popular protocols.
Switch User During Connect
Connect to a Unix console and “switch user” to root without disclosing the passwords of either account.
Open Multiple Connections
Open multiple active connections from the same client computer simultaneously to improve workflow and productivity.
Expandable for Growing Businesses
Work for a multi-office or international business? Session Management is easily expanded so that operations can be centrally located in each geography to maximize the end user experience.
Based on the latest web standards, it runs smoothly in all modern day browsers, including mobile and tablet devices.
Requires only server side installation. No agents are required for any operation on the server or client side.
Enhance your security by integrating with Active Directory or MFA authentication from the most popular providers like Google and Duo Security.
The application components could be installed on any modern Windows or Linux computer.
Keep encrypted application data in the embedded database or MS SQL, Oracle, MySql or PostgreSQL database.
Data in the identity vault is encrypted with AES-265 based encryption. For additionally security, the application can store the master key on a computer separate from the main application or from the application database.
The system components could be installed on multiple nodes across computers, connected through a load balancer, to ensure that failure of a node will not impact system availability.
The system components could be installed on multiple computers to increase performance. The system supports multiple WEB Front Ends, session managers and job engines to process tasks like discovery, password reset or script execution.