Arcon Pam
Arcon Pam
Privileged Access
Management
Introduction
Privileged access management is at the core of cybersecurity requirements. Privileged access, as the term
suggests, is administered by privileged users—administrators and users with elevated permissions—to access
infrastructure and critical business assets. Therefore, any sort of privileged credential compromise or misuse
resulting in unauthorized access to systems might cause a catastrophic IT incident.
As a result, privileged access management requires the utmost security. ARCON | Privileged Access Management
(PAM) provides IT security and risk management staff with adequate security capabilities needed to manage,
monitor, and control privileged users. The solution provides best-in-class security features and functionalities
such as fine-grained controls, rule and role-based access, just-in-time privileges, multifactor authentication,
password vaulting, session monitoring, customized reporting, and many other classic PAM capabilities to address
some of the most complex use-case challenges found in privileged access management environments (hybrid
datacenters, distributed datacenters, multi-cloud, and DevOps environments).
The solution enables IT security teams to comply with a host of IT standards such as PCI-DSS, HIPAA, SOX, and
regulatory mandates such as the GDPR, as well as several regional and local mandates as prescribed by central
banks and cybersecurity governing authorities with respect to data security, data protection, and data integrity.
Trusted by more than 1200 global organizations, ARCON | PAM is known worldwide for its product capabilities,
swift integrations, lower total cost of ownership, and world-class IT support, consulting, and services. ARCON has
been consistently named as a leading brand in the PAM space. Global analyst communities such as Gartner and
KuppingerCole have consistently recognized ARCON as a leader in Privileged Access Management.
Predict | Protect | Prevent
Features for
Password Vaulting
ARCON PAM's password vaulting feature ensures that privileged account passwords are
stored and managed in a highly secure environment by providing a secure and single point
of control. ARCON Password Vault employs strong encryption algorithms, including FIPS-
approved Advanced Encryption Standard (AES) 256-bit encryption. This protects the
credentials stored in the vault from unauthorized access and ensures compliance with FIPS
guidelines. Access to the vault is strictly controlled using strong access controls.
Session Monitoring
Session Monitoring is a feature of ARCON Privileged Access Management (PAM) that
provides real-time monitoring and recording of privileged sessions. Organizations can use
Session Monitoring to monitor privileged user activity in real time, allowing them to detect
and respond to security threats quickly and effectively.
Session Monitoring records a detailed audit trail of all privileged user activity, including all
commands fired and actions. This audit trail is securely stored and can be searched and
analyzed at any time for forensic analysis and compliance reporting purposes.
ARCON PAM also includes real-time alerts for suspicious activity, enabling security teams
to respond to potential threats quickly by freezing or terminating the session. This feature
adds an extra layer of security to privileged accounts and helps to protect sensitive data.
www.arconnet.com
Predict | Protect | Prevent
Multi-factor Authentication
ARCON PAM supports several MFA options, including ARCON Authenticator App, Email
OTP, SMS OTP, hardware tokens, TOTPs like Google and Microsoft Authenticator,
biometric authentication, Facial Recognition, and many more. Organizations can select the
MFA solution that best meets their security needs while also seamlessly integrating with
their existing IT infrastructure. ARCON PAM can also integrate with third-party multi-
factor applications such as Cisco Duo, etc.
ARCON PAM's SSH key management feature automates the process of generating time-
based keys and rotating SSH keys, allowing organizations to manage access to sensitive
systems and applications in a secure manner. It also provides detailed reports on key usage,
allowing administrators to monitor and audit key resource access. This aids in the
prevention of unauthorized access and the defense against cyber threats such as SSH-
based attacks.
Just-In-Time Privilege
One of the important principles in privileged access management- the principle of “least
privileges” can be implemented with ARCON’s JIT privilege capabilities. It ensures that the
right person has access to the right systems at the right time. 24*7 or “always on” privileges
are too risky. JIT allows users to get temporary access to perform tasks that require
elevated privileges without granting them permanent access, lowering the risk of cyber-
attacks due to privileged credential misuse. It enables organizations to limit users'
privileges to the bare minimum while monitoring and auditing elevated access requests.
With JIT approach, access is granted for a limited time and is automatically revoked once
the task or operation is completed. This helps to ensure that privileged access is only used
when necessary and is not left open for unauthorized access. In ARCON PAM for AWS, for
example a user is granted temporary access to an AWS resource such as EC2 instance with
the help of Security Token Service (STS), which provides temporary credentials for
accessing AWS resources.
www.arconnet.com
Predict | Protect | Prevent
Ephemeral Access
This is Just-in-Time privileged interactive access to automatically generate rule and role-
based temporary access rights. Amazon Web Services (AWS) Console or Command Line
Interface (CLI) component that interacts with AWS Secure Token Service (STS) and
allows an administrator to customize accounts with unique AWS roles. When a user logs
in to the AWS management console, they are assigned to a particular AWS position and
regulation, and they can only execute approved operations on the AWS network.
My Vault
My Vault provides a centralized repository where all critical or privileged data for an
organization can be securely stored using advanced encryptions algorithms and role-
based access controls. Privileged users can upload files encrypted and stored in a
centralized/ quarantined repository. My Vault also allows users to transfer files from the
centralized repository to the target servers without requiring them to log in to individual
servers.
Users can upload, download, view, and delete files from the vault in the same way that they
would on a regular drive. Files are stored on the centralized server, which the
Administrator configures, and all Secrets added or uploaded are stored in the database in
an encrypted format. Users can share documents, spreadsheets, images, certificates, SSH
Keys, directly with other My Vault users or with the public via a link without sending them
via email or printing them.
www.arconnet.com
Predict | Protect | Prevent
Privileged Task Automation allows organizations to easily manage and execute scripts with
a few clicks, reducing manual intervention and streamlining task execution.
Datawatch
Datawatch is an ARCON PAM feature that assists organizations in monitoring, detecting,
and alerting on anomalous database activities. It collects and analyses database logs in
order to identify potential security threats or compliance violations.Users can login to any
database application, for example SSMS, etc. using ARCON PAM credentials without
logging into ARCON PAM.
Digital Vault
ARCON | PAM Secrets Management leverages REST-based APIs to authenticate and
provide controlled access to the non-human identities, third-party applications, or custom-
developed applications to fetch secrets. With the tremendous use of APIs to aid
applications access PAM entitlement, various authentication methods have been developed
over the period. ARCON PAM has meticulously examined these methods and has
integrated with most of the authentication methods to adapt to the evolution of Digital
Vault over time.
Development and Operations (DevOps) is one area in IT security where ARCON | PAM
acts as a trusted vanguard to ensure controlled access and protect scripts and other
embedded secrets throughout the DevOps pipeline.
Digital Vault offers Software Development Kits (SDKs) and Plugins that can be integrated
with a variety of third-party tools to enhance the solution's capabilities. The SDKs enable
the development of customized applications that interact with the Digital Vault solution,
allowing for seamless integration with existing workflows and processes. The plugins can
be used to extend Digital Vault's functionality to support additional use cases and
workflows. ARCON Digital Vault assists organizations in developing a more comprehensive
and flexible solution that can adapt to their specific needs by providing these SDKs and
plugins.
www.arconnet.com
Predict | Protect | Prevent
www.arconnet.com
Predict | Protect | Prevent
Features for
IT Efficiency
Single Sign-On
IT infrastructure comprises multiple layers of devices or endpoints to access systems,
which in turn leads to multiple system admins. Therein lies a problem. Multiple system
admins mean multiple user-ids, multiple passwords, and multiple approval processes. The
Single Sign-On feature allows organizations to overcome this challenge.
ARCON offers the most advanced SSO for almost all conventional IT devices with more
than 200+ plug-n-play connectors. This covers a range of devices including Windows,
Unix, Databases (Toad, SQL+, SQL Developer etc.), Network Devices, VMWare, Hyper-V,
Peripheral devices consoles, and Web Applications.
It even allows seamless access across technologies with just one click. It even prevents
possible abuse of privileged accounts while implementing the principle of least privilege.
Auto-discovery
Auto Discovery in ARCON PAM refers to the automatic detection and inventory of IT
assets and resources across the organization's IT infrastructure, such as servers,
network devices, databases, applications, and user accounts.
This function scans the network for privileged accounts associated with devices and
applications. It then generates a detailed inventory of these accounts, giving
organizations complete visibility into all privileged accounts in their environment. This
feature saves organizations time and effort spent manually identifying and managing
privileged accounts, lowering the risk of cyber threats caused by overlooked or
unsecured privileged accounts.
Auto Onboarding
Auto onboarding allows administrators to seamlessly add new server groups, user
accounts with associated privileges to map new users onboarded on ARCON | PAM. It auto
onboard users and assets and map them to appropriate rules (based on roles).
ARCON | PAM supports Auto-Onboarding from cloud platforms such as Amazon Web
Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) to ensure that users
and assets are discovered and managed centrally managed through the portal. This feature
enables organizations to discover, onboard, and secure the access through cloud
infrastructure.
Offline Vault
ARCON|Offline Vault enables remote users not connected to PAM to conduct offline
sessions. The service requests must be approved before performing their required
activities offline. The activities of these users are audited. Once the PAM server is
available, these offline activities are synchronized back to the ARCON PAM Application
using the offline sync service.
www.arconnet.com
Predict | Protect | Prevent
Virtual Grouping
Managing various systems by different teams and yet retaining control within the teams is
a complex task. ARCON | PAM provides a dynamic group setting with one too many
relationships and virtual grouping. Thus, one can create functional groups of various
systems and help in facilitating relationships, responsibilities, and accountabilities. This
feature caters very well to dynamically changing organizational structures, roles,
responsibilities and even allows managing multiple subsidiaries and companies.
Tag Management is a feature that allows users to effectively manage privileged assets.
Users can categorize, label, and classify privileged assets based on criteria such as
location, ownership, sensitivity, and function. Administrators can use this categorization to
group resources based on business objectives and ensure that access is controlled and
audited in accordance with policies and regulations.
Workspace App
The multi-tab feature allows users/administrators to open multiple sessions in
different tabs in the same window and allow them to switch between sessions as
required. Multi-tab feature is supported by SSH and RDP service types. Multiple
service sessions if opened in a tabbed manner in a single window makes it easier for
the user to toggle between services and control all user sessions centrally.
Connector Framework
With the increasing demand for new IT mechanisms rising in an organization, the
protection of the systems by integrating them with ARCON | PAM becomes radical.
ARCON Connector Framework automates the process of creating connectors by
eliminating the need for manual data collection. It also simplifies the process of
provisioning any new application which is not available in PAM.
Robotic Process Automation (RPA) is the process of automating mundane tasks with ease,
efficiency, and accuracy. ARCON PAM users can integrate with various automation
solutions. ARCON | PAM offers a provision to customize steps for the end-users for any
SSO activity.
It could be image-based control recognition, shortcut keys, and Control ID. The RPA
technology can even ensure all use cases of the connectors are fulfilled.
www.arconnet.com
Predict | Protect | Prevent
Incident Management
Incident response mechanisms are given utmost importance today. It is crucial to
respond to applicable incident data in the shortest time to avoid any major loss.
Traditionally, after the incident, the IT teams need the ability to analyze the reasons,
the activities post incident and identification of areas for better responses.
If this process is automated, then there can be synergies across the Incident response
team and it can save lots of valuable time. With Incident Management feature, a
privileged user is able to identify and raise an incident for any activity that looks to be
suspicious.
Unified admin console to manage entities and access to the target systems/applications.
Authorization ensures the implementation of an access control framework around people
and policies. This way, the privileged access is granted only on a “need-to-know” and “need-
to-do” basis, the foundation for robust identity and access control management.
Workflow Management
No more tedious and long approval process. The Workflow matrix makes administrators’
lives easy. It enables configure the approval process for privileged users, user-groups, and
service groups. Workflows can be set for admin activities/transactions as well as for user
access requests. Service Access and Service Password request workflow mechanism speed
up the process of assigning target servers to privileged users.
Browser Plugin
This is a browser-independent extension available for all platforms that offers a point
solution for shielding all of the classified secrets and confidential assets for your
organization at a single location. With the Browser Plugin, users can automatically sign in to
a range of applications that are offered by ARCON | PAM without entering the credentials
manually or even remembering them each time they access the applications directly from
any browser available on their desktop.
www.arconnet.com
Predict | Protect | Prevent
AD Bridging
The main purpose of AD Bridging is to manage and connect to di erent operating systems
within the same network infrastructure from Microsoft Active Directory (MAD) console to
connect data. MAD can accept natively ordinary and non-privileged accounts from non-
Windows machines.
AD Bridging tool in ARCON | PAM allows organizations to use Microsoft AD as their
authoritative source of identity, while extending it to the systems, apps, and protocols not
natively managed by Active Directory. Once the primary users are authenticated against
AD Bridging, it supports Linux and Unix Operating Systems.
Integration
ARCON | PAM provides seamless integrations with a variety of tools from SIEM, ITSM,
RPA, DevOps CI/CD, IDAM, Automation Solutions, Containers and more. Some of the
tools that can be integrated with ARCON are Symantec, RSA, Arcsight, Rapid7, BMC
Remedy, Precision, ServiceNow, Nessus Manager, Tenable.io/Tenable.sc, Qualys, Ansible,
Jenkins, Chef, Kubernetes, Red Hat OpenShift, AWS Elastic Container Service (ECS),
Microsoft AD, Azure Ad, G-Suite, AWS IAM, Okta, Sailpoint, 1Kosmos and many more.
vRA provides operations management across physical, virtual and cloud environments.
vRA(VMware vRealize Automation) automation can be leveraged to perform automation
for Service provisioning in PAM when a new VM is created.
CLI Proxy
The CLI (Command Line Interface) Proxy component in ARCON PAM allows
administrators to manage and monitor remote devices and systems without logging on to
the PAM console or web interfaces. It serves as an intermediary between the user and the
target machine, allowing the user to remotely execute commands on the target device
without logging into the PAM portal. Administrators can use CLI Proxy to execute
commands, scripts, and other operations on remote machines from a centralized location
without physically accessing them. This not only saves time and effort, but it also improves
security by lowering the risk of unauthorized access or system changes. CLI Proxy is useful
in situations where administrators can use their own set of CLI tools, for example Putty,
MobaXTerm, SecureCRT, for RPA processes.
Instead of forcing the client to create trust with ARCON | PAM Vault, there are modules to
transfer the authenticated connection to the client, eliminating the need for the client to
fetch credentials. The Vault Broker not only can securely connect to the ARCON | PAM
Vault but also third-party vaults.
www.arconnet.com
Predict | Protect | Prevent
Features for
ARCON’s robust reporting engine makes your security team audit-ready by providing
customized and detailed analytics of every privileged access to target systems. It helps
them to make better IT privileged user decision making. The solution enables managers
and auditors to assess the organization’s regulatory compliance status at any given time.
www.arconnet.com
Predict | Protect | Prevent
ARCON | PAM
Benefits at a glance
It helps to meet with the regulatory mandates and IT Standards
Support for modern-day use-cases: Cloud Access, DevOps, API workloads, Bots
www.arconnet.com
Predict | Protect | Prevent
Architecture Overview
Multi Factor
Authentication
Single Sign-On
Password
Vaulting Cloud Data Centre
Just in Time
Privileges
PEDM
Knight Analytics
Customized
Reporting
www.arconnet.com
Predict | Protect | Prevent
About ARCON
ARCON is a leading enterprise information risk control solution provider, specializing in Privileged Access Management
(PAM) and continuous risk assessment solutions. Our mission is to help enterprises identify emerging technology risks
and help mitigate them by robust solutions that predict, protect and prevent.
www.arconnet.com