Gartner ‘challenger’ Senhasegura signs strategic partnership with Identity Methods bringing secure remote-access Privileged Access Management solution Domum to European markets
Identity Methods, an end-to-end provider of Zero Trust IT architecture, has announced a strategic partnership with Senhasegura, a global cybersecurity vendor with presence in over 55 countries headquartered in Sao Paulo, Brazil. The agreement will make its Privileged Access Management (PAM) solutions available to UK & Ireland, Nordic and Benelux markets starting with the launch of Domum, which uniquely delivers maximum security for remote workers based on Zero Trust without the need for a VPN, installing agents or additional licensing, nor additional configurations.
With expertise in PAM automation and security, Senhasegura is recognised by Gartneras a ‘challenger’ and is placed among the 10 best global PAM technologies in its 2021 Magic Quadrant for Privileged Access Managementreport. It ranked in the top 3 for above-average PAM technology in Gartner’s Critical Capability report, and according to Gartner’s Peer Insights, 98% of existing Senhasegura customers said they would recommend it, awarding it 4.9 out of 5 stars [based on 109 Gartner peer insights reviews] with 5 stars by 85% of reviewers, earning it Gartner’s Customer Choice award in 2021. It is the only PAM vendor to provide certificates management capabilities in order to easily manage transport layer security (TSL) certificate lifecycles and their expiry dates.
With more companies adopting flexible working models, security teams are facing greater challenges when it comes to guaranteeing the authenticity of requests to access systems remotely, by employees or third parties. Domum has been designed to help control such access using a simple process of authorisation, enabling administrators to grant external access to users in minutes without the need to configure a VPN or install agents. Domum complements PAM by helping to manage remote and off-site access safely and securely in accordance with a Zero Trust philosophy.
To help businesses better understand the importance of implementing a Privileged Access Management (PAM) solution, Identity Methods has published a PAM starter guide:
Privileged Access Management is fast becoming vital in any organisation and should be implemented to achieve the principles of Zero Trust. PAM is an information-security mechanism that safeguards identities with special access or capabilities beyond regular users. When compromised, privileged accounts can pose significant potential risk to the enterprise. A PAM solution is critical to ensure that core enterprise identities are secured and monitored. PAM can solve security weaknesses relating to the sharing of passwords and mitigates the risks associated with long-standing permissions.
Ian Collard, Founder and CEO of Identity Methods explains: “PAM is a key part of an organisation’s overall identity governance strategy. When integrated with broader identity and access management systems, businesses can achieve a unified-governance approach for all employees regardless of their role or level of access. Yet, organisations are still struggling to protect their networks because they don’t factor in the access security controls of third parties such as vendors, service providers and consultants. This is where Domum comes in, bringing peace of mind by controlling access to remote and flexible users, removing uncertainty around such processes and ensuring that protection is extended to cover all points of connectivity for operatives who require systems access, regardless of their location.”
An enterprise-grade PAM solution gives organisations the ability to automate the creation, amendment, and deletion of accounts while providing robust monitoring and reporting. As security administrators need to monitor privileged sessions and investigate any anomalies, a PAM solution’s ability to provide real-time visibility and automated alerting are key benefits for any modern organisation. The launch of Domum greatly complements PAM, leading to a full and rounded capability to monitor all points of connectivity and securely manage access where and when it is required.
To better understand the importance of implementing a Privileged Access Management (PAM) solution download the Privileged Access Management Starter Guide & Toolkit