
Keeper Endpoint Privilege Manager is a Privilege Elevation and Delegation Management (PEDM) solution that enforces least-privilege access policies across endpoints in Windows, macOS and Linux environments. It eliminates standing local admin rights and provides Just-in-Time (JIT) elevation for both users and processes.
Vendor
Keeper Security
Company Website
Enforce least privilege on every endpoint to prevent ransomware, data breaches and insider attacks.
Keeper eliminates standing access rights and enables Just-in-Time (JIT) access across all Windows, Linux and macOS endpoints.
Simple to deploy and manage
Administrators simply deploy a lightweight agent that remove standing admin rights while enabling temporary, policy-based privilege elevation only when necessary. The system enforces customizable security policies through just-in-time access, with optional approval workflows and MFA enforcement. All privileged actions are executed through ephemeral accounts that automatically revoke elevated access once tasks are complete. It works across Windows, macOS and Linux environments while providing visibility through a centralized dashboard that logs all elevation activities for auditing and compliance.
Agent deployment
A Keeper agent is installed on every managed endpoint. This agent intercepts and evaluates privilege elevation requests based on defined organizational policies.
Policy enforcement
Administrators define elevation policies using the Keeper Admin Console. These policies determine what actions users can perform, what applications can be run with elevated privileges and whether approvals or MFA are required.
Ephemeral privileged access
Users are not granted permanent local admin rights. Instead, Keeper Endpoint Privilege Manager temporarily elevates privileges for specific actions using ephemeral, Keeper-controlled accounts.
Visibility and control
The Keeper Admin Console provides real-time visibility into all elevation activity, requests and policy applications across environments. Admins can review, approve or deny requests and view audit logs for compliance.
Elevation process
Users follow a simple elevation flow for applications or processes that require elevated permissions through the Keeper agent.
Policy
If an application or process requires elevation, the Keeper agent checks the relevant policy.
Approval
If approval is required, the request is routed to an admin via the Admin Console or Command Line Interface (CLI).
MFA option
If no approval is needed, the elevation proceeds automatically. MFA enforcement is optional as an additional step.
Cross-platform support
Consistent management is enforced across operating systems, with platform-specific implementations tailored for Windows, macOS and Linux.
- Windows: Users are removed from the local Administrators group
- macOS: Privilege elevation is managed via a system extension.
- Linux: The agent protects sudo elevation requests using policy.
Zero-trust and zero-knowledge security
Information about end-user devices, applications and access requests is fully encrypted on the user's device and can only be decrypted by authorized administrators within the Keeper Admin Console. Keeper never has access to or visibility into customer data, end-user activity or application details - ensuring complete privacy and control always remain with our customers.
Essential features to secure all endpoints
Ephemeral accounts
Temporary, system-generated privileged accounts are created and managed to perform specific elevated tasks, then automatically removed to ensure zero standing privilege and minimize security risk.
Least privilege management
Restricts users and systems to only the minimum access rights necessary to perform their authorized tasks.
Standards-based architecture
Utilizes industry protocols and specifications to ensure systems can easily work together across different platforms and technologies.
Just-in-time access
Provides users with temporary elevated privileges only when needed for specific authorized tasks, automatically revoking these rights once the task is completed or after a predetermined time period.
Flexible policy management
Allows administrators to create customized, context-aware rules for privilege elevation that adapt to different user roles, applications and security requirements across the organization.
Process-level privilege management
Selectively grants elevated privileges to specific applications rather than to users, allowing necessary programs to perform administrative functions while maintaining overall system security.
Benefits that cover every user on every device
Security
Eliminates standing admin rights and enables just-in-time elevation only for approved applications to reduce attack surfaces and improve security.
Compliance
Provides comprehensive audit trails of privilege usage and ensures adherence to regulatory requirements through documented administrative access control.
Operational efficiency
Reduces help desk workload by automating approvals for routine administrative tasks.
User experience
Allows users to complete necessary tasks without IT delays through automated privilege elevation for approved applications.
Scalability
Enables organizations to efficiently enforce least-privilege policies and manage privileged access across thousands of Windows, macOS and Linux endpoints from a centralized platform.
Auditability and visibility
Gives insight into elevation activity, approvals and endpoint policy enforcement with detailed logging and integration into SIEM tools for faster incident response.