Data Security, Enterprise Security, Software Security

Netwrix Privilege Secure Now Reduces Attack Surface

Netwrix Privilege Secure Now Reduces Attack Surface

Netwrix, a leading cybersecurity provider, has recently launched a new version of Netwrix Privilege Secure (formerly Netwrix SbPAM) that extends its zero-standing privileges (ZSP) approach to databases, ensuring privileged accounts only exist for necessary time periods.

  • The rebranded product now includes additional features, such as integrated discovery capabilities to identify all privileged accounts across the IT ecosystem.
  • Improved metadata and keystroke search capabilities for faster threat identification and investigation across live and recorded privileged sessions.
  • Additionally, the product offers a wider range of out-of-the-box reports, customization options, and favorites for generating reports for internal and external auditors.
  • The new version also includes expanded controls for managing service accounts, allowing users to pause, resume, undo, and roll back changes.

Netwrix's Senior VP of Products, Jeff Warren, commented, "Netwrix Privilege Secure now eliminates standing privileged accounts across on-premises databases, further reducing the attack surface for both external and internal threats." He further emphasized, "Our innovative ZSP approach replaces risky privileged accounts with ephemeral accounts that grant the minimum access required and that exist only as long as needed — thwarting adversaries seeking elevated access to move laterally and complete their attacks."

(Source – PR Newswire)

About Netwrix Corporation



Netwrix is a leading provider of data security solutions that help security professionals reduce the risk of a breach and limit the impact of attacks. It has been simplifying the process of identifying and protecting sensitive data, as well as detecting, responding to, and recovering from attacks, since its inception in 2006. Over 13,000 organizations worldwide trust Netwrix solutions to enhance their security and compliance posture by addressing all three primary attack vectors: identity, data and infrastructure.

Spotlight

Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Spotlight

Resources