The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password management for privileged users. These are two additional main concepts. When we talk about third-party users, it's a usual tool because Fudo PAM is a privileged access management tool. We are referring to different users, such as IT administrators, database administrators, and third-party users. The users who connect to customers' manufacturers to solve outsourcing problems, etc. These are classic cases where we propose Fudo PAM to our customers and use it for our infrastructure.
Information Technology Security Specialist at BornaNetworkManagers
Reseller
2020-09-16T08:18:38Z
Sep 16, 2020
The access management part of the solution is the primary part of the product that we use. The client that we have wants to limit user access to applications within the user's sessions. The client wants to keep logs about the users who are working on their servers. The main purpose is really to maintain these logs and restrict the use of applications in a user's session.
We use this product to control access and to administer computers and servers in our company. We are a reseller. We have engineers who configure Fudo Privileged Access Management and deploy the product for our customers. We also test Fudo Privileged Access Management and in the future, we will sell some technical instruments to go along with the product.
We are a system integrator and this is one of the solutions that we provide to our clients. We also use this solution internally. Fudo PAM is used for access management.
What is Privileged Access Management? Privileged access management (PAM) oversees requirements of critical, private accounts living in an enterprise’s IT infrastructure.
The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password management for privileged users. These are two additional main concepts. When we talk about third-party users, it's a usual tool because Fudo PAM is a privileged access management tool. We are referring to different users, such as IT administrators, database administrators, and third-party users. The users who connect to customers' manufacturers to solve outsourcing problems, etc. These are classic cases where we propose Fudo PAM to our customers and use it for our infrastructure.
I work for an IT integrator company. We're resellers.
The access management part of the solution is the primary part of the product that we use. The client that we have wants to limit user access to applications within the user's sessions. The client wants to keep logs about the users who are working on their servers. The main purpose is really to maintain these logs and restrict the use of applications in a user's session.
We use this product to control access and to administer computers and servers in our company. We are a reseller. We have engineers who configure Fudo Privileged Access Management and deploy the product for our customers. We also test Fudo Privileged Access Management and in the future, we will sell some technical instruments to go along with the product.
We are a system integrator and this is one of the solutions that we provide to our clients. We also use this solution internally. Fudo PAM is used for access management.