Skip to content Skip to navigation Skip to footer

Privileged Access Management

Provide controls for privileged accounts with FortiPAM

Download Data Sheet
Privileged Access Management banner background banner dots


FortiPAM provides privileged access management and control for elevated and privileged accounts, processes, and systems across the entire IT environment.

FortiPAM is an integral component of the Fortinet Identity and Access Management (IAM) solution which allows organizations to provide tight security for privileged accounts and privileged credentials. FortiPAM provides the least privileged access to the most sensitive resources within an organization. It enables end-to-end management of privileged accounts, control of privileged user access, and visibility of account usage including monitoring and audit capabilities. These features allow FortiPAM to introduce zero-trust principles to privileged accounts and dramatically lower an organization’s overall attack surface by ensuring privileged accounts and privileged credentials are not misused by accident, by threat actors, or by malicious insiders.

FortiPAM is part of the Fortinet Security Fabric, integrating with products such as FortiClient, FortiAuthenticator, and FortiToken.

ZTNA Controls for Critical Assets

Critical assets need to be protected with the highest level of security. FortiPAM is part of the Fortinet Cybersecurity Framework which allows for enhanced security including zero-trust network access (ZTNA) controls when users try to access critical assets.

ZTNA tags can be applied to check device posture for things like vulnerabilities, updated AV signatures, location, and machine groups. These checks are done on a continuous basis so if something changes on the device, it can immediately be disconnected from the critical asset. In this way, FortiPAM ensures that the users and devices accessing critical assets are as secure as possible and prevents threats from impacting the asset.

Strong Security for Privileged Accounts

Use pre-built application- or web-based launchers, or easily create your own launch templates to provide secure access for your organization's most critical resources.

Once launchers for privileged resources have been created, they can be opened by users that have been granted access to them. When launched, all actions within the resource will be monitored and recorded for auditing purposes with ability to terminate sessions. In addition, based on policy, passwords for the resources can be changed on a scheduled basis or when the resource is checked in by the user.

Features and Benefits


Easily change passwords for privileged accounts and ensure they are kept safe.


Centrally manage role-based access through administrative policies.


Get full video recording and keystroke monitoring of privileged-resource access for easy usage auditing.


Use ZTNA tagging to limit access to privileged resources.


Ensure that no sensitive privileged account information is delivered to the end-user’s device.
security driven networking | security fabric

제로 트러스트 액세스

장치가 네트워크에 연결되어 있다는 이유만으로 모든 것에 액세스할 수 있으리라 가정하는 것은 더 이상 안전하지 않습니다. Fortinet 제로 트러스트 액세스는 누가 그리고 무엇이 내 리소스를 사용하는지 지속적으로 확인합니다. IoT 및 엔드포인트 기기를 식별하고 보호하는 동시에, IT 팀은 네트워크에 연결된 것에 대한 완전한 가시성과 제어력을 확보합니다.


솔루션 가이드, eBook, 데이터 시트, 분석 보고서 등을 확인하세요. Go to Resource Center >

Learn more about FortiPAM 연락처 >