Send message

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Consulting

Privileged User Management (PUM)

by CONET Solutions GmbH

Logo of CONET

Key Facts

  • Authorization concepts especially for privileged users
  • Requirements analysis and engineering for PxM solutions
  • Implementation, review and optimization of PxM solutions

Categories

  • Authentication
  • User (rights) management
  • Access protection

Key Facts

  • Authorization concepts especially for privileged users
  • Requirements analysis and engineering for PxM solutions
  • Implementation, review and optimization of PxM solutions

Categories

  • Authentication
  • User (rights) management
  • Access protection
Show More

PRODUCT DESCRIPTION

Personnel with special responsibilities and functions often require special access and usage rights in IT systems and applications. Privileged User Management controls the special rights of these "privileged users" and protects organizations against deliberate but also unwitting abuse of privileges.
Administrative accounts (such as domain admin, root, or super-user) are a popular target for cyber attacks and therefore exposed to special risks. In order to protect these, various approaches are pursued: While Privileged User Management (PUM) focuses on managing user accounts with extended privileges, Privileged Access Management (PAM) focuses on managing and controlling critical access. Because of these and other existing variations, the abbreviation PxM is increasingly used to summarize all such solutions in conjunction with other security systems.
Due to the complex authorization structures and the criticality of the systems and processes affected by potential damage, as well as the need for still smooth access by privileged users, a coherent PxM places even greater demands on design experience, process know-how, and architectural knowledge than traditional identity management. The security specialists at CONET help you in keeping track of roles and authorizations and to reliably and completely secure your systems and data.

We offer you:

• Authorization concepts especially for privileged users
• Requirements analysis and engineering for PxM solutions
• Implementation, review and optimization of PxM solutions
• Real-time quick-check of roles and permissions
Show More

Product Expert