Privileged Access Management
Provide controls for privileged accounts with FortiPAM
Download Data SheetProvide controls for privileged accounts with FortiPAM
Download Data SheetFortiPAM provides privileged access management and control for elevated and privileged accounts, processes, and systems across the entire IT environment.
FortiPAM is an integral component of the Fortinet Identity and Access Management (IAM) solution which allows organizations to provide tight security for privileged accounts and privileged credentials. FortiPAM provides the least privileged access to the most sensitive resources within an organization. It enables end-to-end management of privileged accounts, control of privileged user access, and visibility of account usage including monitoring and audit capabilities. These features allow FortiPAM to introduce zero-trust principles to privileged accounts and dramatically lower an organization’s overall attack surface by ensuring privileged accounts and privileged credentials are not misused by accident, by threat actors, or by malicious insiders.
FortiPAM is part of the Fortinet Security Fabric, integrating with products such as FortiClient, FortiAuthenticator, and FortiToken.
Critical assets need to be protected with the highest level of security. FortiPAM is part of the Fortinet Cybersecurity Framework which allows for enhanced security including zero-trust network access (ZTNA) controls when users try to access critical assets.
ZTNA tags can be applied to check device posture for things like vulnerabilities, updated AV signatures, location, and machine groups. These checks are done on a continuous basis so if something changes on the device, it can immediately be disconnected from the critical asset. In this way, FortiPAM ensures that the users and devices accessing critical assets are as secure as possible and prevents threats from impacting the asset.
Use pre-built application- or web-based launchers, or easily create your own launch templates to provide secure access for your organization's most critical resources.
Once launchers for privileged resources have been created, they can be opened by users that have been granted access to them. When launched, all actions within the resource will be monitored and recorded for auditing purposes with ability to terminate sessions. In addition, based on policy, passwords for the resources can be changed on a scheduled basis or when the resource is checked in by the user.
假设仅仅有一个设备连接到了网络上,而它应该可以访问所有内容,因此就可以认为环境变得不再安全。Fortinet 零信任访问会持续验证谁正在使用您的什么资源。IoT 和端点设备可以得到识别和保护,而 IT 团队也可以全面了解和控制连接到您网络的内容。
查看更多解决方案手册、eBook、技术参数表、分析师报告。 Go to Resource Center >
Learn more about FortiPAM 联系我们 >