No enterprise is alike in the way they organize privileged users or choose to connect IT systems.
The latest release of Privilege Manager provides greater flexibility and choice by supporting diverse models for computer management and identity federation.
For organizations that manage a variety of privileged users, business units, and connected technologies, Privilege Manager now supports:
Targeted computer groups: You can segment computer groups and restrict your administrators to manage policies and only view the passwords for their assigned group. Each person has a unique experience tailored to their needs.
This is a new type of Computer Group in Privilege Manager that will “target” any user in the computer group so they can only see the contents of that specific computer group and not see all computer groups. It allows you to create and manage smaller subsets of your computer groups, that restrict actions like managing policies, viewing passwords, etc. to inside that group only.
For example, let’s say I have different teams in my organization, like Marketing, Finance, Sales, Customer Service, etc… With the new Target Computer Group, you can section them off to only have access to their “targeted” group. The Admins inside that group would still be able to modify their own policies and view passwords, and any other related activities. They just can’t interact with the other computer groups.
Expanded SAML capabilities: Privilege Manager now also allows multiple Security Assertion Markup Language (SAML) providers to be configured at the same time so that different areas of the organization can federate access in different ways, (for example, Okta for Marketing and Sales, Microsoft for Support).
Rich Text Editor for Windows messages: Privilege Manager now has improved rich text/HTML support for dialogs that open on Windows endpoints. Now, when Admins are configuring the dialogs that can open on Windows endpoint machines, they will have additional controls to style what those dialogs look like.
Offering unique experiences is one thing—ensuring those experiences are effective is another
While these new capabilities offer more flexibility, they also increase enterprise-wide security.
When enterprises have the freedom to choose the structure and technologies that work best for them, they can gain broader adoption of privilege management best practices across the organization.t
As more processes and teams adopt Privilege Manager, enterprises can ensure consistent security standards, such as least privilege access and MFA, and reduce risks associated with over-privileged users.
Privilege Manager is the most comprehensive workstation privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at a cloud-scale. With this latest release, improved usability and stronger security controls make it easier than ever to reduce and manage your organization’s expanding attack surface.
Learn more about how Delinea provides granular access controls through privilege elevation and delegation management (PEDM). With Delinea Privilege Manager, you can ensure all workstations adhere to a least privilege policy by removing local administrator rights which attract cybercriminals. Additionally, with Delinea Cloud Suite, you can protect access to servers and critical infrastructure with just-in-time, just-enough privileges for administrators.