Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

ConsoleWorks serves as a comprehensive platform for cybersecurity and operations in both IT and OT environments, specifically tailored for users with privileged access. It provides secure and continuous remote access along with comprehensive management of user permissions, allowing businesses to govern access across operating systems, network devices, configuration ports, servers, storage systems, applications, and more, all governed by a centralized, role-based access control framework. Notably, ConsoleWorks functions without the need for agent installation on each device; it creates a persistent, secure connection that remains effective regardless of whether the asset is powered on or off or whether the operating system is running, thereby offering out-of-band control and insight. The platform meticulously tracks and logs every privileged action right down to the keystroke, ensuring ongoing auditing, session recording, monitoring of configurations, tracking of patches and assets, and automatic identification of any configuration changes. This level of detail not only enhances security but also promotes accountability and compliance across the organization.

Description

FortiPAM delivers privileged access management, oversight, and regulation of elevated and privileged accounts, processes, and vital systems throughout the complete IT landscape. As a component of the Fortinet Security Fabric, FortiPAM seamlessly integrates with various products including FortiClient, FortiAuthenticator, and FortiToken. To safeguard critical assets, the highest security measures are essential. With FortiPAM, enhanced security is achievable, incorporating zero-trust network access (ZTNA) controls that verify users attempting to access sensitive resources. ZTNA tags can be utilized to assess device posture for vulnerabilities, antivirus status, geographical location, and additional factors. These assessments are conducted on a continuous basis, ensuring that any changes in device status trigger a disconnection from the critical asset. Consequently, FortiPAM guarantees that both users and devices accessing vital resources remain secure, effectively mitigating potential threats. Users have the flexibility to utilize pre-existing applications, web-based launchers, or easily design customized launch templates to suit their specific needs. This adaptability enhances the overall user experience while maintaining robust security protocols.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Azure Marketplace
FortiAuthenticator
FortiClient
FortiToken
Fortinet Security Fabric

Integrations

Azure Marketplace
FortiAuthenticator
FortiClient
FortiToken
Fortinet Security Fabric

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

TDi Technologies

Founded

1991

Country

United States

Website

www.tditechnologies.com

Vendor Details

Company Name

Fortinet

Founded

2000

Country

United States

Website

www.fortinet.com/products/fortipam

Product Features

Product Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Alternatives

Alternatives

FortiGate IPS Reviews

FortiGate IPS

Fortinet
Waterfall Security Reviews

Waterfall Security

Waterfall Security Solutions Ltd.