Logo
Sign in
Product Logo
Privilege ManagerRecast Software

Privileged Access Management (PAM) solution enables tighter security policies for all devices and streamlined workflows. Privilege Manager offers simple, secure, and centralized access rights management.

1416320_PrivilegeManagerWebGraphics05_072822.png
Headphones-on-1024x1024.jpg
1416320_PrivilegeManagerWebGraphics07_080322.png
1416320_PrivilegeManagerWebGraphics09_080322.png
Product details

Overview

Recast Software's Privilege Manager is a comprehensive Privileged Access Management (PAM) solution designed to enhance security and streamline workflows across all devices within an organization. By providing centralized access rights management, Privilege Manager enables IT teams to grant temporary admin rights to users for specific tasks without compromising security. This tool is particularly beneficial for organizations aiming to implement a zero-trust security model, as it allows for secure, temporary elevation of privileges while maintaining tight control over user access. In today's digital landscape, managing user privileges effectively is crucial for maintaining both security and productivity. Privilege Manager addresses these needs by offering a secure and efficient way to manage user privileges, reducing the risk of security breaches and ensuring that users have the access they need to perform their tasks. The solution integrates seamlessly with existing IT infrastructure, making it easy to deploy and manage across the enterprise.

Features

User Privileges

Take control of user privileges – all in one place. Privilege Manager lets you grant and view end-user privileges across your entire environment. Now you can streamline permission requests while keeping your security intact. Self-Service Securely allowing users to perform tasks that usually require a help desk ticket not only frees up your help desk from tedious tasks, it also improves the end user experience across your enterprise. Privilege manager can give users the self-service independence they deserve. Access Code If a user needs to install a piece of software, for example, the help desk can grant them a single-use activation code through Privilege Manager. This allows the user to download and complete the installation quickly and at their convenience. It also provides direct reporting to the IT team on when and why the software was installed. Alternate User IDs Privilege Manager can also provide users with a user ID different than their own that has a set of predetermined access privileges. This allows for the completion of a selected set of tasks with no disruption to their existing privileges, saving the help desk time and getting the end user back into action faster. Current User IDs (online only) If the user ID is part of a specific domain, access can be provided through their current user ID. To complete tasks through this method, the user device must be online.

ID Management

Creating and deploying consistent user IDs and groups at scale is a slow and error-prone process. This could leave glaring holes in your enterprise security. Privilege Manager streamlines your ID management, giving you complete control. Leave nothing to chance while improving your overall IT security and efficiency. User ID Creation Privilege Manager gives you incredible flexibility in the creation of local user IDs and groups. Whether you are using the structure of your existing Active Directory or predefined rules and permissions, using a specific device type or configuring domain-specific IDs and group rules on the domain level, Privilege Manager has it covered for all these instances and more. Password Management Privilege Manager is focused on empowering your help desk to accomplish more while being safe and secure. Your team can use a Privilege Manager created local admin account and password to install software, troubleshoot or whatever is needed to help resolve the ticket.

Group Management

Creating, managing, and scheduling user groups across environments has always been a difficult and tedious task. Privilege Manager makes it all possible, quickly and easily, all while increasing your overall security. Managing Group Members Adding or removing members to and from a group based on rules has never been easier. Privilege Manager enables techs to manage group membership at will. They can also provide temporary, specific privileges that allow users to complete certain tasks, while not giving the user unlimited rights. Creating Groups Group creation can be done in a snap by using predefined rules. These rules ensure each member has the correct permissions for what they need and when they need it. Privilege Manager provides enhanced flexibility in almost any environment. Scheduling Group Membership With Privilege Manager, group membership can be automatically scheduled. Allowing users to join a group membership for a specific amount of time allows a user to accomplish the task they need to within a pre-determined time frame. Then that particular user can be automatically removed from that group, maintaining the integrity of the environment’s security.

Reporting

With Privilege Manager’s reporting capabilities, you will have full visibility into exactly which employees and devices have certain types of permissions. Reports also provide data on users who have requested passwords. Beyond our preset reports, custom reporting allows you to create reports that slice and dice the data as you see fit. Group Rules Reporting Easily look in a single list or search to see which group management rules have been created in Privilege Manager. Also see which group rules have been applied to specific groups. User Rules Reports Know which user rules have been created in Privilege Manager. See all user rules in a single list, search user rules for specific devices, or see user rules applied to a specific organization group. Computer Reports Quickly see which devices have the Privilege Manager client installed. This will also show the local groups and local users on the specific computer even if Privilege Manager is not actively managing the groups or users.  Temporary User IDs Increase security by seeing which users can use temporary user IDs. Also discover how often the Temporary User ID has been used and quickly see what the reason for the request was for.  Password Reporting Add another layer of protection by gaining insight into which users have requested passwords for specific devices. Reports detail the dates, times, and frequency of password requests.