
ARCON EPM enforces endpoint security best practices, protecting business-critical data with centralized governance and application restrictions.
Vendor
ARCON
Company Website
ARCON Endpoint Privilege Management (EPM) is designed to enforce a Just-in-Time (JIT) privileged access principle, following the principles of Zero Trust and Least Privilege. It acts as a centralized engine to ensure rule and role-based access to business-critical applications. ARCON EPM offers centralized governance, managing various endpoints such as Windows, Linux, and macOS through a centralized admin console. It includes application restrictions to reduce threats from harmful applications by classifying them based on risk levels, blacklisting, and whitelisting applications. Privileged Elevation and Delegation Management (PEDM) enables IT administrators to grant temporary elevated privileges to end users for specific tasks, adhering to the principle of least privileges. File Integrity Monitoring (FIM) provides an added layer of security by identifying unauthorized changes to files. It also offers an independent workflow for dynamic workflow management, enhancing administrative efficiency. Audit trails, reporting, and alert trends ensure compliance with IT standards and monitor endpoint privileges for suspicious activity.
Features:
- Centralized Governance: Offers a centralized admin console for managing various endpoints such as Windows, Linux and macOS. Centralized engine ensures rule-based access to applications. Built-in auto-profiling allows administrators to create and segregate profiles of the users based on their roles.
- Application Restrictions: The threat vector created by unrestricted usage of harmful applications can be significantly reduced through classifying applications based on risk levels associated with them. Application Restrictions help to secure all the endpoints in the network by blacklisting and whitelisting applications.
- Privileged Elevation and Delegation Management (PEDM): Enables IT administrators to grant temporary elevated privileges to end users that need to perform specific project-based tasks on Windows, MacOS, Linux and Unix environments. The PEDM functionality allows IT security teams to adhere to the principle of least privileges.
- File Integrity Monitoring (FIM): Provides an added layer of security to IT security pros. FIM helps to identify unapproved or unauthorized changes made on files in end-user devices and take necessary actions (rollbacks if needed) while keeping track of file history.
- Independent workflow: Offers dynamic workflow management to ease end users’ experience and enhance administrative efficiency. End users out of the network can easily raise requests for elevated access to get things done seamlessly.
- Audit Trails, Reporting and Alert Trends: Provides audit trails of each endpoint privileged activity and the reports are generated whenever there is any audit requirement. It ensures compliance with the global IT standards. In addition, it monitors endpoint privileges and triggers alerts in case of suspicious activity.