Skip to content
Search
Search
▼
Step 1 of 5
All fields are required
To what degree do you:
Support dual authorization for privileged operations on critical or sensitive secrets and assets. For example, requring just-in-time privileged access approval or doublelock to provide an extra layer of security for accessing secrets.
Access Control
Choose Level
Low
Medium
High
N/A
Support just-in-time access request for elevated permissions to run privileged commands and applications on workstations and servers.
Access Control
Choose Level
Low
Medium
High
N/A
Control application launch with local controls enforcing privilege elevation policies on Windows workstations.
Access Control
Choose Level
Low
Medium
High
N/A
Eliminate local privileged accounts on Linux and UNIX to reduce the attack surface and align with the Printiple of Least Privilege and zero standing privileges.
Access Control
Choose Level
Low
Medium
High
N/A
Support mutual authentication between PAM components using cryptographic credentials. This mitigates the risk of rogue parties attempting to compromise the system.
Access Control
Choose Level
Low
Medium
High
N/A
Restrict privileged access to registered and company-owned endpoints to ensure that company-sanctions assets are protected.
Access Control
Choose Level
Low
Medium
High
N/A
Prohibit privileged access by any client that is unknown, not secured, and untrusted.
Access Control
Choose Level
Low
Medium
High
N/A
Manage the lifecycle of service/applications from provisioning to deprovisioning to rationalize the number of accounts and reduce the attack surface.
Account Lifecycle Management
Choose Level
Low
Medium
High
N/A
Automate the credential management for service/application accounts and their dependencies. Ensure that when rotating a service/application account password, you don't break any other service dependent on the same account.
Account Lifecycle Management
Choose Level
Low
Medium
High
N/A
Provide notifications, MFA services, and access to vaulted secrets via a mobile app that can provide necessary access via cellular even if WiFi is unavailable.
Availability & Disaster Recovery
Choose Level
Low
Medium
High
N/A
Next
Step 2 of 5
All fields are required
To what degree do you:
Replace plaintext, hard-coded credentials and sensitive configuration data from source code, configuration, and script files. Replace with programmatic calls to the vault to obtain secrets and credentials. This prevents adversaries from harvesting sensitive data on the disk.
DevOps
Choose Level
Low
Medium
High
N/A
Automate privilege security in DevOps workflows and tooling.
DevOps
Choose Level
Low
Medium
High
N/A
Enable creation of basic elevation policies to run privileged applications on Windows servers to support least privilege.
Identity Governance
Choose Level
Low
Medium
High
N/A
Enable creation of basic elevation policies to run privileged applications on Windows and Mac workstations to support least privilege.
Identity Governance
Choose Level
Low
Medium
High
N/A
No local user accounts for the PAM platform. Integrate the Platform into the Organizations Identity Provider such as AD, LDAP, Azure AD or Okta.
Identity Management
Choose Level
Low
Medium
High
N/A
For routine administrative activity, don't use shared (anonymous) accounts. Admins use their individual account for all access, ensuring that logged events tie back to a unique user. This streamlines incident response and audit activities.
Insights & Incident Response
Choose Level
Low
Medium
High
N/A
Record remote sessions initiated from the vault. Sessions can be replayed and meta data searched (e.g., typed commands) to facilitate incident investigations and audits.
Insights & Incident Response
Choose Level
Low
Medium
High
N/A
Send session activity metadata to a SIEM tool for SOC data enrichment, event correlation, and reporting, and alerting.
Insights & Incident Response
Choose Level
Low
Medium
High
N/A
Support session monitoring to observe login sessions in real-time and provide the option to terminate the session if suspicious activity is observed.
Insights & Incident Response
Choose Level
Low
Medium
High
N/A
Integrate with User and Entity Behavior Analytics (UEBA) tools for more advanced threat detection and alerting.
Insights & Incident Response
Choose Level
Low
Medium
High
N/A
Previous
Next
Step 3 of 5
All fields are required
To what degree do you:
Import Excel, or automatically discover all local Linux privileged accounts and vault them to ensure you have centralized management and control over their use.
Inventory & Classification
Choose Level
Low
Medium
High
N/A
Import Excel, or automatically discover all local Windows privileged accounts to ensure visibility.
Inventory & Classification
Choose Level
Low
Medium
High
N/A
Discover local Linux/UNIX SSH keys on servers and workstations.
Inventory & Classification
Choose Level
Low
Medium
High
N/A
Discover privileged admin groups, roles, and security configuration files to ensure visiblity.
Inventory & Classification
Choose Level
Low
Medium
High
N/A
Automatically discover service/application accounts across Identity and Cloud Service Providers for visibility.
Inventory & Classification
Choose Level
Low
Medium
High
N/A
Integrate with IT Service Management tools (such as ServiceNow) to drive access control request workflows tied to help desk tickets.
Choose Level
Low
Medium
High
N/A
Create Roles to constrain access and strictly control the use of all powerfull roles and groups in the PAM platform such as Admin role of System Administrator group.
Least Privilege
Choose Level
Low
Medium
High
N/A
Enforce MFA when checking out a secret to ensure the user is the legitimate owner of the credential.
MFA at Depth
Choose Level
Low
Medium
High
N/A
Enforce MFA at workstations and servers for direct login and privileged command and application execution.
MFA at Depth
Choose Level
Low
Medium
High
N/A
Vault the most privileged accounts within the environment, those that can create other accounts, move laterally to access multiple systems, and that have full control within your trust fabric (AD and AAD). Enable access only in emergency situations.
Secrets Vaulting & Management
Choose Level
Low
Medium
High
N/A
Previous
Next
Step 4 of 5
All fields are required
To what degree do you:
Focus on the most privileged groups within the environment, those membership grant permission to create other accounts, move laterally grant full control within your trust fabric (AD and AAD).
Secrets Vaulting & Management
Choose Level
Low
Medium
High
N/A
Manage admin groups, roles, and security configuration files that might grant privileges across all assets.
Secrets Vaulting & Management
Choose Level
Low
Medium
High
N/A
Vault all discovered service/application accounts to ensure you have centralized control over their use.
Secrets Vaulting & Management
Choose Level
Low
Medium
High
N/A
For emergency PAM accounts, establish hardware-based MFA.
Secure PAM
Choose Level
Low
Medium
High
N/A
Store emergency PAM accounts within a physical fire-proof safe or use software-based MFA for identity assurance.
Secure PAM
Choose Level
Low
Medium
High
N/A
Protect the vault master encryption key in a hardware security module (HSM) such as the AWS KMS.
Secure PAM
Choose Level
Low
Medium
High
N/A
Leverage vaulted credentials to automatically launch login sessions to targets other than servers and websites. Extend credential and session security to any target that has a suitable API such as PowerShell, PuTTY, SQL Server, and Notepad.
Secure Remote Access
Choose Level
Low
Medium
High
N/A
For remote server access, enforce the use of an "alternate admin account" and MFA for stronger protection.
Secure Remote Access
Choose Level
Low
Medium
High
N/A
Previous
Next
Step 5 of 5
All fields are required
Enter your contact info below and submit to see your finished report.
Choose Industry
Agriculture
Business Services
Colleges & Universities
Construction
Consumer Services
Education
Energy, Utilities & Waste
Federal
Finance
Government
Healthcare Services
Holding Companies & Conglomerates
Hospitality
Hospitals & Physicians Clinics
Insurance
Law Firms & Legal Services
Local
Manufacturing
Media & Internet
Minerals & Mining
Motor Vehicles
Organizations
Real Estate
Retail
School Districts
Software
State
Telecommunications
Transportation
Choose Country
United States
Canada
Afghanistan
Aland Islands
Albania
Algeria
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia, Plurinational State of
Bonaire, Sint Eustatius and Saba
Bosnia and Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Congo
Congo, the Democratic Republic of the
Cook Islands
Costa Rica
Cote d'Ivoire
Croatia
Curaçao
Cyprus
Czech Republic
Denmark
Djibouti
Dominica
Dominican Republic
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard Island and McDonald Islands
Holy See (Vatican City State)
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Japan
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic of
Kosovo, Republic of
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libyan Arab Jamahiriya
Liechtenstein
Lithuania
Luxembourg
Macao
Macedonia, the former Yugoslav Republic of
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Moldova, Republic of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Norway
Oman
Pakistan
Palestinian Territory, Occupied
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Qatar
Reunion
Romania
Rwanda
Saint Barthélemy
Saint Helena, Ascension and Tristan da Cunha
Saint Kitts and Nevis
Saint Lucia
Saint Martin (French part)
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Sint Maarten (Dutch part)
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Spain
Sri Lanka
Sudan
Suriname
Svalbard and Jan Mayen
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic of
Thailand
Timor-Leste
Togo
Tokelau
Tonga
Trinidad and Tobago
Tunisia
Turkey
Turkmenistan
Turks and Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United Kingdom
Uruguay
Uzbekistan
Vanuatu
Venezuela, Bolivarian Republic of
Viet Nam
Virgin Islands, British
Wallis and Futuna
Western Sahara
Yemen
Zambia
Zimbabwe
State/Province*
Alabama
Alaska
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of Columbia
Florida
Georgia
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Maryland
Massachusetts
Michigan
Minnesota
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
North Carolina
North Dakota
Ohio
Oklahoma
Oregon
Pennsylvania
Rhode Island
South Carolina
South Dakota
Tennessee
Texas
Utah
Vermont
Virginia
Washington
West Virginia
Wisconsin
Wyoming
Armed Forces Pacific
Province*
Alberta
British Columbia
Manitoba
New Brunswick
Newfoundland and Labrador
Nova Scotia
Northwest Territories
Nunavut
Ontario
Prince Edward Island
Quebec
Saskatchewan
Yukon Territories
State*
Australian Capital Territory
New South Wales
Northern Territory
Queensland
South Australia
Tasmania
Victoria
Western Australia
State*
Andaman and Nicobar Islands
Andhra Pradesh
Arunachal Pradesh
Assam
Bihar
Chandigarh
Chhattisgarh
Dadra and Nagar Haveli
Daman & Diu
Delhi
Goa
Gujarat
Haryana
Himachal Pradesh
Jammu and Kashmir
Jharkhand
Karnataka
Kerala
Lakshadweep
Madhya Pradesh
Maharashtra
Manipur
Meghalaya
Mizoram
Nagaland
Odisha
Puducherry
Punjab
Rajasthan
Sikkim
Tamil Nadu
Telangana
Tripura
Uttarakhand
Uttar Pradesh
West Bengal
By checking this box, you are indicating that you do want to be contacted (by email or phone) by Delinea.
Delinea needs the contact information you provide to us to contact you about our products and services. If you have subscribed, you may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our
Privacy Policy
.
1
2
3
4
5