
Digital sovereignty is a fundamental right for citizens, institutions, and society. That’s why we work every day.
We strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.
What we believe
For senhasegura, protection, access, and confidentiality of privileged information are fundamental rights of any organization and society as a whole.
Our Mission
To help organizations build sovereignty and security over access and privileged information.
Our Vision
To be the best privileged access management solution in the global market.
Why senhasegura
Do as they do. Trust in senhasegura!







Digital sovereignty is a fundamental right for citizens, institutions, and society. That’s why we work every day.
We strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.
What we believe
For senhasegura, protection, access, and confidentiality of privileged information are fundamental rights of any organization and society as a whole.
Our Mission
To help organizations build sovereignty and security over access and privileged information.
Our Vision
To be the best privileged access management solution in the global market.
Why senhasegura
Do as they do. Trust in senhasegura!







Domum
Zero trust access for remote workers and third-parties with no need for VPN.
What it is
It’s possible to delete credentials embedded in source codes, scripts and configuration files, making passwords managed by the solution and invisible to developers and IT support staff.Secure remote access for employees and third-party, providing zero trust-based access to the company’s network without the need for VPN.
Benefits
Maximum access segregation based on granularity offered by senhasegura;
Instant, easy and secure access to employees and third-party with no need for login into the PAM platform;
No need for VPN or additional configuration for remote users;
Operational gain in the management of remote users;
All benefits brought by senhasegura’s Privileged Account and Session Management capabilities, such as real-time monitoring, session recording, threat analysis and user behavior.
How it works
Whenever an employee or third-party needs access to devices managed by the PAM platform, senhasegura Domum sends a link for the approved access available to the final user, which allows instant and secure access to allowed devices.
Features
senhasegura’s agentless architecture with no need for additional software or licensing;
senhasegura Domum allows access to devices with no need for username/password;
Centralized management with intuitive dashboards;
All session features such as recording and LiveStream;
A unique desktop screen which allows a centralized view of actions performed in the environment;
Access restriction based on aspects like geolocation, time or day of the week, and duration;
Access workflows with maximum granularity, based on industry-recognized access groups.
Technical Features
Agentless and passwordless approach for secure and instant access to managed assets;

senhasegura Domum allows access to devices with no need for username/password;

senhasegura’s agentless architecture with no need for additional software or licensing;

senhasegura Domum allows access to devices with no need for username/password.

Access Management (PAM)
Manage the full cycle of high privilege credentials.
What it is
Centralized access management, with the purpose of protecting and controlling the use of generic and high privilege credentials, providing secure storage, access segregation and full traceability of use.
Benefits
- Operational gain in the password change process;
- Guaranteed password delivery in a secure and controlled manner;
- Transparent authentication on the target system or network device without displaying the password to network administrators or third parties.
How it works
By configuring Access Groups, you can define the administrator users who will have permission to receive a physical access password, and the group of users who can use the remote access offered by the solution to access a target device or system. All cases may follow approval workflows and reasons provided by the requesting user.
Features
- Secure storage of credentials and passwords;
- Definition of groups for access segregation based on user profiles;
- Flexibility in the approval process for access to privileged accounts (pre-approved accesses, accesses with single or multiple approval);
- Possibility of more than one user requesting access to the same privileged account, without compromising usage traceability;
- Emergency access for immediate password viewing, with reason request and alert to responsible parties if the approver is unavailable;
- Dual password custody to ensure more than one presence in the access;
- Integration with the Help Desk and Change Management tools to validate the reason provided by the requesting user;
- Passwords change according to predetermined time of use or after consultation;
- Automated password change on the main technological platforms, such as network, servers, database, web applications, and security equipment.
Technical features
- Password storage using strong encryption standards (AES 256, SHA 256, RSA 2048 bits or higher and FIPS 140-2), and also using HSM devices;
- Integration with leading directory services for managing groups and access profiles, and thus controlling credential use.
Session Management (PSM)
Access to your company’s servers without revealing the password.
What it is
Benefits
- Traceability of all actions performed by generic and third-party credentials;
- Less time spent troubleshooting;
- Isolated evidence repository, encrypted, and protected against removal or alteration.
How it works
Features
- Session recordings in video format, without the need for local agents;
- Recording of commands typed in RDP and SSH environments;
- Session reviewed through the solution, or exported to MP4 format;
- Search for session log by:
- User;
- Credential used;
- Device or system accessed;
- Typed commands;
- Metadata;
- Type of activity;
- Time interval.
- Real-time monitoring of sessions in progress and possibility of closing the session remotely.
Technical features
Session recordings and keyboard logs can be enabled:
- To register actions performed in all sessions through the solution;
- To register actions performed on a target device, system, or HTTPs page;
- To register remote access by a user group or device group;
- In sessions via local client on the user’s workstation (PuTTy or Terminal Service).
Task Management
Secured privileged task management.
What it is
User action management on devices, allowing a user to execute a specific task without the need of password granting or privileged session authorization.
Benefits
- Enforcement of the least privilege concept required to perform privileged tasks;
- Automating privileged tasks with authorized settings for environment executions;
- Enables the secure execution of critical security tasks by less specialized resources;
- Securely authorize privileged actions that will be performed on the devices.
How it works
senhasegura Task Management allows privileged task management on devices. From the automation of privileged tasks, it is possible to assign only the necessary permissions so that any user can perform critical activities in the environment in a secure way.
Features
- Authorize profiles and execute actions from the Function Panel, according to users and departments;
- Segregation of features and controls, avoiding single administrator in management.
- Configuration of which privileged actions and users should follow access workflows to execute;
- Monitoring all performed tasks on the environment through run-logs;
- Creation and approval of task configuration templates for users to run;
- Privileged execution of actions manually or automatically, by unit or batch;
- Sending actions and privileged execution notifications via email or SIEM;
- Support for multiple protocols and APIs.
Technical features
Support for SSH, Telnet, RDP, VNC, RPC, WMI, LDAPS and HTTPS, X11 protocols.
Scan Discovery
Discover privileged credentials automatically.
What it is
The Scan Discovery feature surveys the environment and enables automated registration of devices and their respective credentials in the solution. In this way, senhasegura ensures that all credentials and devices are available for use, and that none of are unknown or outside the privileged access management process.
Benefits
- Easy device and credential registration during the deployment process;
- Schedule a periodic assessment of the environment to ensure that new devices and credentials are identified;
- Independence from the asset inventory process in order to keep the solution current.
How it works
Scan Discovery can be run in any environment, or applied to a specific network segment. You can also define the search plugins that will be used, as well as the types of devices and credentials that will be identified.
The solution can also connect to the network device through its standard protocol (SSH/TELNET, RDP) without the need to install a local agent. Thus, hostname, IP address, credential list, privilege type, and usage log information is collected, such as last access and password change date.
Features
- Periodic network scanning by IP range;
- Automatic identification of privileged accounts in the following environments:
- Unix;
- Linux;
- Windows, on local machines or in Active Directory;
- Oracle;
- MS SQL;
- MySQL.
Technical features
The solution has the ability to identify any type of device connected to your network, including:
- Servers (Linux/Unix, Windows and VMWare)
- Database (Oracle, SQL, MySQL)
- Network devices (Firewall, Routers, Switches, Balancers);
- Workstations.
SSH Key Management
Securely control the SSH key cycle.
What it is
Secure storage, rotation and access control for SSH key protection.
Benefits
- Blocking unauthorized access to privileged accounts using SSH keys;
- Control and traceability of SSH key use;
- Management of trust relationships between SSH keys and systems.
How it works
SSH key management is centralized in the solution, which automatically switches key pairs according to your company’s security policies.
Features
- Linux server scan and SSH key identification;
- Connection list structuring between servers;
- SSH Keys resetting with manual publishing;
- SSH Keys publishing;
- Key mapping reports;
- Report and access logs on the use of SSH keys.
Technical features
Encryption of stored SSH keys and all communication through them.
Application Identity
Eliminate hard-coded passwords and identify privileged accesses.
What it is
It’s possible to delete credentials embedded in source codes, scripts and configuration files, making passwords managed by the solution and invisible to developers and IT support staff.
Benefits
- Reliable authentication of all password requests through applications;
- Use of the solution’s connection API for application credential management;
- Granular access control, providing remote access to a specific service or application without displaying the password to the requesting user;
How it works
The solution uses a proprietary template to change the password for application credentials, storing the new password in encrypted form on its database. The credential can be viewed directly by the solution’s connection API or inserted directly into the application server’s connection pool.
Features
- Passwords are changed:
- Automatically in legacy applications;
- In HTTP, HTTPS and Social Network applications;
- In a synchronized manner for credentials used in the integration between the database and the application;
- In a connection pool.
- Interface for remote access to applications with session recording;
- Templates for application password change in open and auditable format.
Technical features
- Password change of credentials on Application Servers (JBoss, GlassFish, WebLogic and others);
- Access limitation through IP, Path and Token API queries;
- Integration support for RESTful APIs;
- Java component integrated with the vault and password cache to prevent unavailability.
Threat Analysis
Automatic analysis of crucial actions.
What it is
A solution dedicated to environment monitoring in order to detect and send real-time alerts of any suspicious action performed with privileged credentials, allowing the security team to prevent an ongoing attack.
Benefits
- Reduced response time to attacks;
- Automatic blocking of stolen privileged credentials;
- Visibility of threats associated with privileged accounts;
- Access to all information associated with the incident.
How it works
A list of suspicious commands and behaviors in the environment is classified according to the level of risk. Whenever risk are identified, alerts are issued and consolidated on a graphic dashboard. The information security team can therefore take immediate action if necessary.
Features
- Graphic dashboards with risk and threat information;
- Alerts with detailed information about the occurrence of suspicious activity;
- Analysis of user sessions with record of abnormality in reports;
- Audit, command alert and blocking, even for privileged users;
- Recording of command input and output logs;
- Command scoring according to the level of risk of each command;
- Identification of lateral movement and privilege escalation;
- Sending suspicious activity alerts to SIEM/SYSLOG.
Technical features
- Self-learning of operating machine history and user behavior to identify any change that represents a threat;
- Scoring, monitoring, alerting and command blocking based on whitelist and blacklist;
- Automatic response for detection of threats without human intervention.
Behavior Analysis
Monitor user behavior automatically.
What it is
Even when privileged access is inherent to the user’s role, some critical stages in access management include detection, alert and response to activities performed by this kind of credential.
Benefits
- Privilege Abuse Restriction;
- Control over administrative user actions;
- Quick detection of attacks and compromised accounts;
- Automatic response to suspected credential theft.
How it works
The solution has a self-learning mechanism to identify and respond to any changes in user behavior patterns and access profiles.
Features
- User session analysis based on behavioral history;
- Identification of suspicious accesses or queries by a series of criteria:
- Excessive number;
- Unusual time;
- Unknown origin;
- Atypical duration.
- Identification of unusual behaviors with abnormality alerts for SIEM/SYSLOG;
- Algorithms developed by senhasegura are continuously adjusted to user behavior;
- Detailed dashboards provide visual representation of incidents and threats, allowing for quick action by the security team.
Technical features
The solution runs an analysis of the following variables:
- Workstation of origin;
- Target system;
- Credentials used;
- Denied access attempts;
- Time and length of session;
- Attempt to execute blocked commands;
- Execution of monitored commands.
Password Reset
Reset passwords automatically or based on a schedule.
What it is
A password-free environment is still just a concept far from reality, despite being discussed for a long time. For now, the world is stuck with usernames and passwords, and no matter how secure the authentication solution may be, those credentials will not be phased out overnight.
Currently, a more secure approach for using passwords is when a password can only be used once. Single-use passwords protect users from credential theft. Unlike static ones, which don’t change, using passwords only once makes systems resistant to attack.
Once entered in senhasegura, passwords are managed by the solution’s password vault. This means that the vault can change the password at any time. These changes can occur in the following ways:
- Determined by the institution’s password policies (automatic): based on the company’s password policies registered in the system, the vault changes keys automatically and periodically, facilitating the task of the information security team;
- Determined by password exposure (automatic): When a user is authorized to view a password stored by the vault, the password can be used for a set period of time in the system. When this time is over, the vault will immediately change the password so that the credential returns to the vault custody;
- Requested by an administrator user: a user with administrator privileges in the vault can schedule a password change for some or all devices registered in the vault at any time.
Local User Provisioning
Create and manage local users centrally.
What it is
Provisioning and revocation of privileged local user access on Windows, Linux and Unix platforms, enabling centralized and automated management of devices that aren’t integrated with directory services.
Benefits
- Operational gain in the process of creating and revoking local user accesses;
- Guaranteed revocation of all disconnected user accesses on devices not managed by directory services (AD/ALDAP);
- Secure password delivery, with email sent directly to the provisioned user.
How it works
Provisioning works with no need of installing an agent on the target device. At the time of provisioning, you can define the type of credential being created, register a new home, select the shell that will be used, and send an operation success or failure message to the requester.
Features
- Provisioning one user on multiple servers or multiple users on the same server;
- Sending a new password directly to the person responsible for the login via email;
- Automatic blocking of all logins for a given user upon termination;
- Comment record in the target device’s password file containing the tool operator’s username and the Service Request;
- For the device shell, a shell can be chosen from among those installed on the device at the time of user provisioning. A non-existent shell can therefore not be selected, preventing process execution errors.
Technical features
User Provisioning on the following platforms:
- Main Linux distributions;
- Unix;
- Windows;
- AIX;
- HP-UX;
- Tru64.
Certificate Management
Automatic and centralized digital certificate management.
What it is
Centralized management of digital certificates lifecycle within the organization, from discovery through automatic scanning on websites, directories and web servers, to automated renewal of the certificate through external or internal Certification Authorities.
Benefits
- Centralized management of digital certificates, allowing a complete and centralized view of all certificates and their statuses;
- Reduction of downtime due to expiration of certificates or human errors in the publication process;
- Automation of the certificate lifecycle management, as well as validations through complete APIs;
- Increased security level of applications with secure certificates, respecting the organization’s security requirements and policies.
How it works
Creation, management, and protection of SSL digital certificates on senhasegura’s infrastructure.

Features
- Discovery of certificates in the network in an automated and recurring way. Certificates found during the Scan Discovery process are read and evaluated, allowing graphical visualization of any risk situation;
- Use of pre-registered organizations, reducing errors in certificate creation;
- Full control over the validity dates of the certificates under management, by automatically sending alerts in configurable periods for specific teams;
- Digital certificate life cycle control, with automatic renewal and publishing of certificates. It is possible to automatically set up periodic renewal, preventing missing expiration dates;
- Graphical display of the status of all certificates, allowing to identify, for example, which ones use encryption for non-compliance with the organization’s security policies;
Technical features
Integration with the leading Market Certification Authorities to sign certificates within the solution, including those self-signed.
Hardcoded passwords
Manage hardcoded passwords securely.
What it is
The world has been dealing with commercial computing for over half a century, but it still makes the same mistakes. One of them is the use of hardcoded passwords on systems and devices connected to the corporate network, making the company data an easy target for malicious attackers.
senhasegura allows for easy removal of hardcoded passwords and credentials from data sources through scripts, application codes, configuration files and SSH keys, via servers. The password vault connects to the main servers and synchronizes password change with the database. The application, therefore, does not lose connection.
The built-in application can access the senhasegura API at any time and receive the updated password for the resource to be accessed. In this way, this critical data will be inaccessible to all intruders and malicious users.
senhasegura SaaS
Fast and easy protection of privileged access.
What it is
The compliance with current standards and regulations (LGPD; DGPR; PCI DSS; ISA 62443; among others) is a challenge for companies of all sizes, especially when time is against us.
senhsegura SaaS is the first Brazilian PAM solution to offer a cloud-native password vault, protecting privileged credentials in managing, rotating password, auditing, and monitoring privileged accounts.
Easily deployed, senhasegura SaaS automatically rotates credentials that administrators use to access critical systems across the organization, thus preventing bad access from negatively impacting your business.
Advantages of deploying a PAM solution such as senhasegura SaaS include:
- Simplification of privileged access management efforts;
- Removal of concerns related to upgrades, which are made directly on the cloud;
- Infrastructure investment becomes unnecessary;
- Recordings and audits of privileged sessions in accordance with current security rules and regulations;
- It allows both internal and external users to enter credentials (passwords) in secure access sessions without users knowing or seeing which credentials were used, dramatically reducing the chances of phishing or misuse;
- It manages access from any privileged account: from local administrators or shared domains to personal admin user accounts;
- It is ideal for all sizes businesses.
senhsegura SaaS version of cloud-based PAM reduces the burden of administrative security management, coupled with rapid system start-up.
Managing privileged access credentials on the cloud, in addition to simplifying the process, enables it to be more cost-effective, making the resource affordable to businesses of all sizes.
Privileged Information Protection
Protect your business’ critical and sensitive information.
What it is
Storage of personal information, such as personal passwords and digital certificates.
Benefits
- Automated control of privileged information;
- Use of digital certificates for access to systems and services;
- Automated authentication using personal access credentials.
How it works
The solution manages the entire life cycle of stored information, such as when a digital certificate is close to expiring.
Features
- Digital certificates storage;
- Personal passwords storage;
- Alert on stored information expiration;
- User-friendly information search screen;
- Privileged information change and use logs;
- Permission to share information with other users.
Technical features
Learn about all the benefits of protecting your information with senhasegura
Ensuring your company’s digital security does not need to be a concern when you apply the right solution. Our products serve to ensure the smooth operation of your company’s critical system.
Watch Demo
PAM core [3.18] - How to create a personal protected information - en-US
Cloud [3.18] - How to connect an Azure account to the Cloud module - en-US
PAM core [3.18] - How to create a new access group - en-US
PAM core [3.18] - How to change the keyboard layout and language in remote sessions - en-US
PAM core [3.18] - How to relate parent credential and slave credential - en-US
PAM core [3.18] - How to configure a domain - en-US
Orbit [3.18] - How to check the version license and updates of senhasegura - en-US
PAM core [3.20] - How to setup RDP session using admin - en-US
Gartner - Trends - en-US
PAM core [3.18] - How to setup an exceptional access - en-US
221 - Configurations - Orbit [3.18] - How to change hostname through simple commands - en-US
Gartner - What are the Secrets Management functionalities - en-US
PAM core [3.18] - How to setup an SMTP server - en-US
Orbit [3.18] - How to update senhasegura in a stand alone environment - en-US
PAM core [3.18] - How to add a new credential to the Vault - en-US
Orbit [3.18] - How to setup Wizard and activating the application - en-US
Orbit [3.18] - How to setup an NTP server - en-US
Cloud [3.18] - Conecting the AWS environment to the cloud module - en-US
Discovery [3.18] - How to create a Glossary of Devices - en-US
Discovery [3.18] - How to do ScanDiscovery in your network - en-US
senhasegura.go [3.20] - How to activate the offline mode of senhasegura.go - en-US
senhasegura.go [3.20] - How to enable the session recording of senhasegura.go - en-US
senhasegura.go [3.20] - How to setup the user expiration in the module Go - en-US
PAM core [3.20] - How to setup the JIT elevation of privilege - en-US
senhasegura.go [3.20] - How to setup an automation on senhasegura.go - en-US
senhasegura.go [3.20] - How to enable the Single Sign On in senhasegura.go - en-US
senhasegura.go [3.20] - How to configure the malware analisys in senhasegura.go - en-US
senhasegura.go [3.20] - How to install senhasegura.go - en-US
senhasegura.go [3.20] - How to setup the password withdrawal for senhasegura.go - en-US
senhasegura.go [3.20] - How to configure the approval workflow for senhasegura.go - en-US
senhasegura.go [3.20] - How to configure audit command in senhasegura.go - en-US
senhasegura.go [3.20] - How to setup the access list on senhasegura.go - en-US
senhasegura.go [3.20] - How to withdraw a credential from senhasegura.go - en-US
senhasegura.go [3.20] - How to setup execution and blocking messages in senhasegura.go - en-US
senhasegura.go [3.20] - How to setup automatic updates for senhasegura.go - en-US
檔案類型 | 檔案名稱 | 下載 | 分享 |
---|---|---|---|
資料表 | SEE HOW A PAM SOLUTION WORKS | ||
資料表 | RUN AS...ENDPOINT PROTECTION | ||
資料表 | MANAGEMENT OF THE LIFECYCLE OF THE DIGITAL CERTIFICATES | ||
資料表 | DevOps | ||
白皮書 | PCI DSS | ||
白皮書 | GDPR | ||
白皮書 | ISO | ||
白皮書 | LGPD | ||
白皮書 | NIST |
日期
標題

自動化特權存取管理和安全平台
我們努力確保公司對行為和特權信息的擁有主權。為此,我們通過跟踪管理員對網絡、伺服器、數據庫和大量設備的操作來防止數據被盜。此外,我們追求符合審計要求和最苛刻的標準,包括 PCI DSS、Sarbanes-Oxley、ISO 27001 和 HIPAA。
Digital sovereignty is a fundamental right for citizens, institutions, and society. That’s why we work every day.
We strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.
What we believe
For senhasegura, protection, access, and confidentiality of privileged information are fundamental rights of any organization and society as a whole.
Our Mission
To help organizations build sovereignty and security over access and privileged information.
Our Vision
To be the best privileged access management solution in the global market.
Why senhasegura
Do as they do. Trust in senhasegura!







Digital sovereignty is a fundamental right for citizens, institutions, and society. That’s why we work every day.
We strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.
What we believe
For senhasegura, protection, access, and confidentiality of privileged information are fundamental rights of any organization and society as a whole.
Our Mission
To help organizations build sovereignty and security over access and privileged information.
Our Vision
To be the best privileged access management solution in the global market.
Why senhasegura
Do as they do. Trust in senhasegura!







Domum
Zero trust access for remote workers and third-parties with no need for VPN.
What it is
It’s possible to delete credentials embedded in source codes, scripts and configuration files, making passwords managed by the solution and invisible to developers and IT support staff.Secure remote access for employees and third-party, providing zero trust-based access to the company’s network without the need for VPN.
Benefits
- Maximum access segregation based on granularity offered by senhasegura;
- Instant, easy and secure access to employees and third-party with no need for login into the PAM platform;
- No need for VPN or additional configuration for remote users;
- Operational gain in the management of remote users;
- All benefits brought by senhasegura’s Privileged Account and Session Management capabilities, such as real-time monitoring, session recording, threat analysis and user behavior.
How it works
Whenever an employee or third-party needs access to devices managed by the PAM platform, senhasegura Domum sends a link for the approved access available to the final user, which allows instant and secure access to allowed devices.
Features
- senhasegura’s agentless architecture with no need for additional software or licensing;
- senhasegura Domum allows access to devices with no need for username/password;
- Centralized management with intuitive dashboards;
- All session features such as recording and LiveStream;
- A unique desktop screen which allows a centralized view of actions performed in the environment;
- Access restriction based on aspects like geolocation, time or day of the week, and duration;
- Access workflows with maximum granularity, based on industry-recognized access groups.
Technical Features

Agentless and passwordless approach for secure and instant access to managed assets;

senhasegura Domum allows access to devices with no need for username/password;

senhasegura’s agentless architecture with no need for additional software or licensing;

senhasegura Domum allows access to devices with no need for username/password.
Access Management (PAM)
What it is
Centralized access management, with the purpose of protecting and controlling the use of generic and high privilege credentials, providing secure storage, access segregation and full traceability of use.
Benefits
- Operational gain in the password change process;
- Guaranteed password delivery in a secure and controlled manner;
- Transparent authentication on the target system or network device without displaying the password to network administrators or third parties.
How it works
By configuring Access Groups, you can define the administrator users who will have permission to receive a physical access password, and the group of users who can use the remote access offered by the solution to access a target device or system. All cases may follow approval workflows and reasons provided by the requesting user.
Features
- Secure storage of credentials and passwords;
- Definition of groups for access segregation based on user profiles;
- Flexibility in the approval process for access to privileged accounts (pre-approved accesses, accesses with single or multiple approval);
- Possibility of more than one user requesting access to the same privileged account, without compromising usage traceability;
- Emergency access for immediate password viewing, with reason request and alert to responsible parties if the approver is unavailable;
- Dual password custody to ensure more than one presence in the access;
- Integration with the Help Desk and Change Management tools to validate the reason provided by the requesting user;
- Passwords change according to predetermined time of use or after consultation;
- Automated password change on the main technological platforms, such as network, servers, database, web applications, and security equipment.
Certificate Management
What it is
Centralized management of digital certificates lifecycle within the organization, from discovery through automatic scanning on websites, directories and web servers, to automated renewal of the certificate through external or internal Certification Authorities.
Benefits
- Centralized management of digital certificates, allowing a complete and centralized view of all certificates and their statuses;
- Reduction of downtime due to expiration of certificates or human errors in the publication process;
- Automation of the certificate lifecycle management, as well as validations through complete APIs;
- Increased security level of applications with secure certificates, respecting the organization’s security requirements and policies.
How it works
Creation, management, and protection of SSL digital certificates on senhasegura’s infrastructure.

Features
- Discovery of certificates in the network in an automated and recurring way. Certificates found during the Scan Discovery process are read and evaluated, allowing graphical visualization of any risk situation;
- Use of pre-registered organizations, reducing errors in certificate creation;
- Full control over the validity dates of the certificates under management, by automatically sending alerts in configurable periods for specific teams;
- Digital certificate life cycle control, with automatic renewal and publishing of certificates. It is possible to automatically set up periodic renewal, preventing missing expiration dates;
- Graphical display of the status of all certificates, allowing to identify, for example, which ones use encryption for non-compliance with the organization’s security policies;
Technical Features
- Integration with the leading Market Certification Authorities to sign certificates within the solution, including those self-signed.
Access Management (PAM)
What it is
Centralized access management, with the purpose of protecting and controlling the use of generic and high privilege credentials, providing secure storage, access segregation and full traceability of use.
Benefits
- Operational gain in the password change process;
- Guaranteed password delivery in a secure and controlled manner;
- Transparent authentication on the target system or network device without displaying the password to network administrators or third parties.
How it works
By configuring Access Groups, you can define the administrator users who will have permission to receive a physical access password, and the group of users who can use the remote access offered by the solution to access a target device or system. All cases may follow approval workflows and reasons provided by the requesting user.
Features
- Secure storage of credentials and passwords;
- Definition of groups for access segregation based on user profiles;
- Flexibility in the approval process for access to privileged accounts (pre-approved accesses, accesses with single or multiple approval);
- Possibility of more than one user requesting access to the same privileged account, without compromising usage traceability;
- Emergency access for immediate password viewing, with reason request and alert to responsible parties if the approver is unavailable;
- Dual password custody to ensure more than one presence in the access;
- Integration with the Help Desk and Change Management tools to validate the reason provided by the requesting user;
- Passwords change according to predetermined time of use or after consultation;
- Automated password change on the main technological platforms, such as network, servers, database, web applications, and security equipment.
Technical features
- Password storage using strong encryption standards (AES 256, SHA 256, RSA 2048 bits or higher and FIPS 140-2), and also using HSM devices;
- Integration with leading directory services for managing groups and access profiles, and thus controlling credential use.
Session Management (PSM)
What it is
Recording and storage of all remote sessions performed through the solution for later viewing.
The recording can be used to prove the change to a database, identify an improper action in a critical system, find the root cause of a problem, or meet audit, inspection or legal demands.
Benefits
- Traceability of all actions performed by generic and third-party credentials;
- Less time spent troubleshooting;
- Isolated evidence repository, encrypted, and protected against removal or alteration.
How it works
senhasegura records a unique hash for each session, and you can specifically identify each user’s activity during access, even if they are using a shared credential.
Features
- Session recordings in video format, without the need for local agents;
- Recording of commands typed in RDP and SSH environments;
- Session reviewed through the solution, or exported to MP4 format;
- Search for session log by:
- User;
- Credential used;
- Device or system accessed;
- Typed commands;
- Metadata;
- Type of activity;
- Time interval.
- Real-time monitoring of sessions in progress and possibility of closing the session remotely.
Technical features
Session recordings and keyboard logs can be enabled:
- To register actions performed in all sessions through the solution;
- To register actions performed on a target device, system, or HTTPs page;
- To register remote access by a user group or device group;
- In sessions via local client on the user’s workstation (PuTTy or Terminal Service).
senhasegura SaaS
The compliance with current standards and regulations (LGPD; DGPR; PCI DSS; ISA 62443; among others) is a challenge for companies of all sizes, especially when time is against us.
senhsegura SaaS is the first Brazilian PAM solution to offer a cloud-native password vault, protecting privileged credentials in managing, rotating password, auditing, and monitoring privileged accounts.
Easily deployed, senhasegura SaaS automatically rotates credentials that administrators use to access critical systems across the organization, thus preventing bad access from negatively impacting your business.
Advantages of deploying a PAM solution such as senhasegura SaaS include:
- Simplification of privileged access management efforts;
- Removal of concerns related to upgrades, which are made directly on the cloud;
- Infrastructure investment becomes unnecessary;
- Recordings and audits of privileged sessions in accordance with current security rules and regulations;
- It allows both internal and external users to enter credentials (passwords) in secure access sessions without users knowing or seeing which credentials were used, dramatically reducing the chances of phishing or misuse;
- It manages access from any privileged account: from local administrators or shared domains to personal admin user accounts;
- It is ideal for all sizes businesses.
senhsegura SaaS version of cloud-based PAM reduces the burden of administrative security management, coupled with rapid system start-up.
Managing privileged access credentials on the cloud, in addition to simplifying the process, enables it to be more cost-effective, making the resource affordable to businesses of all sizes.
Scan Discovery
What it is
The Scan Discovery feature surveys the environment and enables automated registration of devices and their respective credentials in the solution. In this way, senhasegura ensures that all credentials and devices are available for use, and that none of are unknown or outside the privileged access management process.
Benefits
- Easy device and credential registration during the deployment process;
- Schedule a periodic assessment of the environment to ensure that new devices and credentials are identified;
- Independence from the asset inventory process in order to keep the solution current.
How it works
Scan Discovery can be run in any environment, or applied to a specific network segment. You can also define the search plugins that will be used, as well as the types of devices and credentials that will be identified.
The solution can also connect to the network device through its standard protocol (SSH/TELNET, RDP) without the need to install a local agent. Thus, hostname, IP address, credential list, privilege type, and usage log information is collected, such as last access and password change date.
Features
- Periodic network scanning by IP range;
- Automatic identification of privileged accounts in the following environments:
- Unix;
- Linux;
- Windows, on local machines or in Active Directory;
- Oracle;
- MS SQL;
- MySQL.
Technical features
The solution has the ability to identify any type of device connected to your network, including:
- Servers (Linux/Unix, Windows and VMWare)
- Database (Oracle, SQL, MySQL)
- Network devices (Firewall, Routers, Switches, Balancers);
- Workstations.
Local User Provisioning
What it is
Provisioning and revocation of privileged local user access on Windows, Linux and Unix platforms, enabling centralized and automated management of devices that aren’t integrated with directory services.
Benefits
- Operational gain in the process of creating and revoking local user accesses;
- Guaranteed revocation of all disconnected user accesses on devices not managed by directory services (AD/ALDAP);
- Secure password delivery, with email sent directly to the provisioned user.
How it works
Provisioning works with no need of installing an agent on the target device. At the time of provisioning, you can define the type of credential being created, register a new home, select the shell that will be used, and send an operation success or failure message to the requester.
Features
- Provisioning one user on multiple servers or multiple users on the same server;
- Sending a new password directly to the person responsible for the login via email;
- Automatic blocking of all logins for a given user upon termination;
- Comment record in the target device’s password file containing the tool operator’s username and the Service Request;
- For the device shell, a shell can be chosen from among those installed on the device at the time of user provisioning. A non-existent shell can therefore not be selected, preventing process execution errors.
Technical features
User Provisioning on the following platforms:
- Main Linux distributions;
- Unix;
- Windows;
- AIX;
- HP-UX;
- Tru64.
SSH Key Management
What it is
Secure storage, rotation and access control for SSH key protection.
Benefits
- Blocking unauthorized access to privileged accounts using SSH keys;
- Control and traceability of SSH key use;
- Management of trust relationships between SSH keys and systems.
How it works
SSH key management is centralized in the solution, which automatically switches key pairs according to your company’s security policies.
Features
- Linux server scan and SSH key identification;
- Connection list structuring between servers;
- SSH Keys resetting with manual publishing;
- SSH Keys publishing;
- Key mapping reports;
- Report and access logs on the use of SSH keys.
Technical features
Encryption of stored SSH keys and all communication through them.
Application Identity
What it is
It’s possible to delete credentials embedded in source codes, scripts and configuration files, making passwords managed by the solution and invisible to developers and IT support staff.
Benefits
- Reliable authentication of all password requests through applications;
- Use of the solution’s connection API for application credential management;
- Granular access control, providing remote access to a specific service or application without displaying the password to the requesting user;
How it works
The solution uses a proprietary template to change the password for application credentials, storing the new password in encrypted form on its database. The credential can be viewed directly by the solution’s connection API or inserted directly into the application server’s connection pool.
Features
- Passwords are changed:
- Automatically in legacy applications;
- In HTTP, HTTPS and Social Network applications;
- In a synchronized manner for credentials used in the integration between the database and the application;
- In a connection pool.
- Interface for remote access to applications with session recording;
- Templates for application password change in open and auditable format.
Technical features
- Password change of credentials on Application Servers (JBoss, GlassFish, WebLogic and others);
- Access limitation through IP, Path and Token API queries;
- Integration support for RESTful APIs;
- Java component integrated with the vault and password cache to prevent unavailability.
Behavior Analysis
What it is
Even when privileged access is inherent to the user’s role, some critical stages in access management include detection, alert and response to activities performed by this kind of credential.
Benefits
- Privilege Abuse Restriction;
- Control over administrative user actions;
- Quick detection of attacks and compromised accounts;
- Automatic response to suspected credential theft.
How it works
The solution has a self-learning mechanism to identify and respond to any changes in user behavior patterns and access profiles.
Features
- User session analysis based on behavioral history;
- Identification of suspicious accesses or queries by a series of criteria:
- Excessive number;
- Unusual time;
- Unknown origin;
- Atypical duration.
- Identification of unusual behaviors with abnormality alerts for SIEM/SYSLOG;
- Algorithms developed by senhasegura are continuously adjusted to user behavior;
- Detailed dashboards provide visual representation of incidents and threats, allowing for quick action by the security team.
Technical features
The solution runs an analysis of the following variables:
- Workstation of origin;
- Target system;
- Credentials used;
- Denied access attempts;
- Time and length of session;
- Attempt to execute blocked commands;
- Execution of monitored commands.
Threat Analysis
What it is
A solution dedicated to environment monitoring in order to detect and send real-time alerts of any suspicious action performed with privileged credentials, allowing the security team to prevent an ongoing attack.
Benefits
- Reduced response time to attacks;
- Automatic blocking of stolen privileged credentials;
- Visibility of threats associated with privileged accounts;
- Access to all information associated with the incident.
How it works
A list of suspicious commands and behaviors in the environment is classified according to the level of risk. Whenever risk are identified, alerts are issued and consolidated on a graphic dashboard. The information security team can therefore take immediate action if necessary.
Features
- Graphic dashboards with risk and threat information;
- Alerts with detailed information about the occurrence of suspicious activity;
- Analysis of user sessions with record of abnormality in reports;
- Audit, command alert and blocking, even for privileged users;
- Recording of command input and output logs;
- Command scoring according to the level of risk of each command;
- Identification of lateral movement and privilege escalation;
- Sending suspicious activity alerts to SIEM/SYSLOG.
Technical features
- Self-learning of operating machine history and user behavior to identify any change that represents a threat;
- Scoring, monitoring, alerting and command blocking based on whitelist and blacklist;
- Automatic response for detection of threats without human intervention.
Privileged Information Protection
What it is
Storage of personal information, such as personal passwords and digital certificates.
Benefits
- Automated control of privileged information;
- Use of digital certificates for access to systems and services;
- Automated authentication using personal access credentials.
How it works
The solution manages the entire life cycle of stored information, such as when a digital certificate is close to expiring.
Features
- Digital certificates storage;
- Personal passwords storage;
- Alert on stored information expiration;
- User-friendly information search screen;
- Privileged information change and use logs;
- Permission to share information with other users.
Technical features
Support to ICP-Brasil validated digital certificates.
Hardcoded passwords
The world has been dealing with commercial computing for over half a century, but it still makes the same mistakes. One of them is the use of hardcoded passwords on systems and devices connected to the corporate network, making the company data an easy target for malicious attackers.
senhasegura allows for easy removal of hardcoded passwords and credentials from data sources through scripts, application codes, configuration files and SSH keys, via servers. The password vault connects to the main servers and synchronizes password change with the database. The application, therefore, does not lose connection.
The built-in application can access the senhasegura API at any time and receive the updated password for the resource to be accessed. In this way, this critical data will be inaccessible to all intruders and malicious users.
Password Reset
A password-free environment is still just a concept far from reality, despite being discussed for a long time. For now, the world is stuck with usernames and passwords, and no matter how secure the authentication solution may be, those credentials will not be phased out overnight.
Currently, a more secure approach for using passwords is when a password can only be used once. Single-use passwords protect users from credential theft. Unlike static ones, which don’t change, using passwords only once makes systems resistant to attack.
Once entered in senhasegura, passwords are managed by the solution’s password vault. This means that the vault can change the password at any time. These changes can occur in the following ways:
- Determined by the institution’s password policies (automatic): based on the company’s password policies registered in the system, the vault changes keys automatically and periodically, facilitating the task of the information security team;
- Determined by password exposure (automatic): When a user is authorized to view a password stored by the vault, the password can be used for a set period of time in the system. When this time is over, the vault will immediately change the password so that the credential returns to the vault custody;
- Requested by an administrator user: a user with administrator privileges in the vault can schedule a password change for some or all devices registered in the vault at any time.
Domum
Zero trust access for remote workers and third-parties with no need for VPN.
What it is
It’s possible to delete credentials embedded in source codes, scripts and configuration files, making passwords managed by the solution and invisible to developers and IT support staff.Secure remote access for employees and third-party, providing zero trust-based access to the company’s network without the need for VPN.
Benefits
- Maximum access segregation based on granularity offered by senhasegura;
- Instant, easy and secure access to employees and third-party with no need for login into the PAM platform;
- No need for VPN or additional configuration for remote users;
- Operational gain in the management of remote users;
- All benefits brought by senhasegura’s Privileged Account and Session Management capabilities, such as real-time monitoring, session recording, threat analysis and user behavior.
How it works
Whenever an employee or third-party needs access to devices managed by the PAM platform, senhasegura Domum sends a link for the approved access available to the final user, which allows instant and secure access to allowed devices.
Features
- senhasegura’s agentless architecture with no need for additional software or licensing;
- senhasegura Domum allows access to devices with no need for username/password;
- Centralized management with intuitive dashboards;
- All session features such as recording and LiveStream;
- A unique desktop screen which allows a centralized view of actions performed in the environment;
- Access restriction based on aspects like geolocation, time or day of the week, and duration;
- Access workflows with maximum granularity, based on industry-recognized access groups.
Technical Features
Agentless and passwordless approach for secure and instant access to managed assets;
senhasegura Domum allows access to devices with no need for username/password;
senhasegura’s agentless architecture with no need for additional software or licensing;
senhasegura Domum allows access to devices with no need for username/password.
Access Management (PAM)
What it is
Centralized access management, with the purpose of protecting and controlling the use of generic and high privilege credentials, providing secure storage, access segregation and full traceability of use.Benefits
- Operational gain in the password change process;
- Guaranteed password delivery in a secure and controlled manner;
- Transparent authentication on the target system or network device without displaying the password to network administrators or third parties.
How it works
By configuring Access Groups, you can define the administrator users who will have permission to receive a physical access password, and the group of users who can use the remote access offered by the solution to access a target device or system. All cases may follow approval workflows and reasons provided by the requesting user.Features
- Secure storage of credentials and passwords;
- Definition of groups for access segregation based on user profiles;
- Flexibility in the approval process for access to privileged accounts (pre-approved accesses, accesses with single or multiple approval);
- Possibility of more than one user requesting access to the same privileged account, without compromising usage traceability;
- Emergency access for immediate password viewing, with reason request and alert to responsible parties if the approver is unavailable;
- Dual password custody to ensure more than one presence in the access;
- Integration with the Help Desk and Change Management tools to validate the reason provided by the requesting user;
- Passwords change according to predetermined time of use or after consultation;
- Automated password change on the main technological platforms, such as network, servers, database, web applications, and security equipment.
Certificate Management
What it is
Centralized management of digital certificates lifecycle within the organization, from discovery through automatic scanning on websites, directories and web servers, to automated renewal of the certificate through external or internal Certification Authorities.
Benefits
- Centralized management of digital certificates, allowing a complete and centralized view of all certificates and their statuses;
- Reduction of downtime due to expiration of certificates or human errors in the publication process;
- Automation of the certificate lifecycle management, as well as validations through complete APIs;
- Increased security level of applications with secure certificates, respecting the organization’s security requirements and policies.
How it works
Creation, management, and protection of SSL digital certificates on senhasegura’s infrastructure.
Features
- Discovery of certificates in the network in an automated and recurring way. Certificates found during the Scan Discovery process are read and evaluated, allowing graphical visualization of any risk situation;
- Use of pre-registered organizations, reducing errors in certificate creation;
- Full control over the validity dates of the certificates under management, by automatically sending alerts in configurable periods for specific teams;
- Digital certificate life cycle control, with automatic renewal and publishing of certificates. It is possible to automatically set up periodic renewal, preventing missing expiration dates;
- Graphical display of the status of all certificates, allowing to identify, for example, which ones use encryption for non-compliance with the organization’s security policies;
Technical Features
- Integration with the leading Market Certification Authorities to sign certificates within the solution, including those self-signed.
Access Management (PAM)
What it is
Centralized access management, with the purpose of protecting and controlling the use of generic and high privilege credentials, providing secure storage, access segregation and full traceability of use.
Benefits
- Operational gain in the password change process;
- Guaranteed password delivery in a secure and controlled manner;
- Transparent authentication on the target system or network device without displaying the password to network administrators or third parties.
How it works
By configuring Access Groups, you can define the administrator users who will have permission to receive a physical access password, and the group of users who can use the remote access offered by the solution to access a target device or system. All cases may follow approval workflows and reasons provided by the requesting user.
Features
- Secure storage of credentials and passwords;
- Definition of groups for access segregation based on user profiles;
- Flexibility in the approval process for access to privileged accounts (pre-approved accesses, accesses with single or multiple approval);
- Possibility of more than one user requesting access to the same privileged account, without compromising usage traceability;
- Emergency access for immediate password viewing, with reason request and alert to responsible parties if the approver is unavailable;
- Dual password custody to ensure more than one presence in the access;
- Integration with the Help Desk and Change Management tools to validate the reason provided by the requesting user;
- Passwords change according to predetermined time of use or after consultation;
- Automated password change on the main technological platforms, such as network, servers, database, web applications, and security equipment.
Technical features
- Password storage using strong encryption standards (AES 256, SHA 256, RSA 2048 bits or higher and FIPS 140-2), and also using HSM devices;
- Integration with leading directory services for managing groups and access profiles, and thus controlling credential use.
Session Management (PSM)
What it is
Recording and storage of all remote sessions performed through the solution for later viewing.
The recording can be used to prove the change to a database, identify an improper action in a critical system, find the root cause of a problem, or meet audit, inspection or legal demands.
Benefits
- Traceability of all actions performed by generic and third-party credentials;
- Less time spent troubleshooting;
- Isolated evidence repository, encrypted, and protected against removal or alteration.
How it works
senhasegura records a unique hash for each session, and you can specifically identify each user’s activity during access, even if they are using a shared credential.
Features
- Session recordings in video format, without the need for local agents;
- Recording of commands typed in RDP and SSH environments;
- Session reviewed through the solution, or exported to MP4 format;
- Search for session log by:
- User;
- Credential used;
- Device or system accessed;
- Typed commands;
- Metadata;
- Type of activity;
- Time interval.
- Real-time monitoring of sessions in progress and possibility of closing the session remotely.
Technical features
Session recordings and keyboard logs can be enabled:
- To register actions performed in all sessions through the solution;
- To register actions performed on a target device, system, or HTTPs page;
- To register remote access by a user group or device group;
- In sessions via local client on the user’s workstation (PuTTy or Terminal Service).
senhasegura SaaS
The compliance with current standards and regulations (LGPD; DGPR; PCI DSS; ISA 62443; among others) is a challenge for companies of all sizes, especially when time is against us.
senhsegura SaaS is the first Brazilian PAM solution to offer a cloud-native password vault, protecting privileged credentials in managing, rotating password, auditing, and monitoring privileged accounts.
Easily deployed, senhasegura SaaS automatically rotates credentials that administrators use to access critical systems across the organization, thus preventing bad access from negatively impacting your business.
Advantages of deploying a PAM solution such as senhasegura SaaS include:
- Simplification of privileged access management efforts;
- Removal of concerns related to upgrades, which are made directly on the cloud;
- Infrastructure investment becomes unnecessary;
- Recordings and audits of privileged sessions in accordance with current security rules and regulations;
- It allows both internal and external users to enter credentials (passwords) in secure access sessions without users knowing or seeing which credentials were used, dramatically reducing the chances of phishing or misuse;
- It manages access from any privileged account: from local administrators or shared domains to personal admin user accounts;
- It is ideal for all sizes businesses.
senhsegura SaaS version of cloud-based PAM reduces the burden of administrative security management, coupled with rapid system start-up.
Managing privileged access credentials on the cloud, in addition to simplifying the process, enables it to be more cost-effective, making the resource affordable to businesses of all sizes.
Scan Discovery
What it is
The Scan Discovery feature surveys the environment and enables automated registration of devices and their respective credentials in the solution. In this way, senhasegura ensures that all credentials and devices are available for use, and that none of are unknown or outside the privileged access management process.
Benefits
- Easy device and credential registration during the deployment process;
- Schedule a periodic assessment of the environment to ensure that new devices and credentials are identified;
- Independence from the asset inventory process in order to keep the solution current.
How it works
Scan Discovery can be run in any environment, or applied to a specific network segment. You can also define the search plugins that will be used, as well as the types of devices and credentials that will be identified.
The solution can also connect to the network device through its standard protocol (SSH/TELNET, RDP) without the need to install a local agent. Thus, hostname, IP address, credential list, privilege type, and usage log information is collected, such as last access and password change date.
Features
- Periodic network scanning by IP range;
- Automatic identification of privileged accounts in the following environments:
- Unix;
- Linux;
- Windows, on local machines or in Active Directory;
- Oracle;
- MS SQL;
- MySQL.
Technical features
The solution has the ability to identify any type of device connected to your network, including:
- Servers (Linux/Unix, Windows and VMWare)
- Database (Oracle, SQL, MySQL)
- Network devices (Firewall, Routers, Switches, Balancers);
- Workstations.
Local User Provisioning
What it is
Provisioning and revocation of privileged local user access on Windows, Linux and Unix platforms, enabling centralized and automated management of devices that aren’t integrated with directory services.
Benefits
- Operational gain in the process of creating and revoking local user accesses;
- Guaranteed revocation of all disconnected user accesses on devices not managed by directory services (AD/ALDAP);
- Secure password delivery, with email sent directly to the provisioned user.
How it works
Provisioning works with no need of installing an agent on the target device. At the time of provisioning, you can define the type of credential being created, register a new home, select the shell that will be used, and send an operation success or failure message to the requester.
Features
- Provisioning one user on multiple servers or multiple users on the same server;
- Sending a new password directly to the person responsible for the login via email;
- Automatic blocking of all logins for a given user upon termination;
- Comment record in the target device’s password file containing the tool operator’s username and the Service Request;
- For the device shell, a shell can be chosen from among those installed on the device at the time of user provisioning. A non-existent shell can therefore not be selected, preventing process execution errors.
Technical features
User Provisioning on the following platforms:
- Main Linux distributions;
- Unix;
- Windows;
- AIX;
- HP-UX;
- Tru64.
SSH Key Management
What it is
Secure storage, rotation and access control for SSH key protection.
Benefits
- Blocking unauthorized access to privileged accounts using SSH keys;
- Control and traceability of SSH key use;
- Management of trust relationships between SSH keys and systems.
How it works
SSH key management is centralized in the solution, which automatically switches key pairs according to your company’s security policies.
Features
- Linux server scan and SSH key identification;
- Connection list structuring between servers;
- SSH Keys resetting with manual publishing;
- SSH Keys publishing;
- Key mapping reports;
- Report and access logs on the use of SSH keys.
Technical features
Encryption of stored SSH keys and all communication through them.
Application Identity
What it is
It’s possible to delete credentials embedded in source codes, scripts and configuration files, making passwords managed by the solution and invisible to developers and IT support staff.
Benefits
- Reliable authentication of all password requests through applications;
- Use of the solution’s connection API for application credential management;
- Granular access control, providing remote access to a specific service or application without displaying the password to the requesting user;
How it works
The solution uses a proprietary template to change the password for application credentials, storing the new password in encrypted form on its database. The credential can be viewed directly by the solution’s connection API or inserted directly into the application server’s connection pool.
Features
- Passwords are changed:
- Automatically in legacy applications;
- In HTTP, HTTPS and Social Network applications;
- In a synchronized manner for credentials used in the integration between the database and the application;
- In a connection pool.
- Interface for remote access to applications with session recording;
- Templates for application password change in open and auditable format.
Technical features
- Password change of credentials on Application Servers (JBoss, GlassFish, WebLogic and others);
- Access limitation through IP, Path and Token API queries;
- Integration support for RESTful APIs;
- Java component integrated with the vault and password cache to prevent unavailability.
Behavior Analysis
What it is
Even when privileged access is inherent to the user’s role, some critical stages in access management include detection, alert and response to activities performed by this kind of credential.
Benefits
- Privilege Abuse Restriction;
- Control over administrative user actions;
- Quick detection of attacks and compromised accounts;
- Automatic response to suspected credential theft.
How it works
The solution has a self-learning mechanism to identify and respond to any changes in user behavior patterns and access profiles.
Features
- User session analysis based on behavioral history;
- Identification of suspicious accesses or queries by a series of criteria:
- Excessive number;
- Unusual time;
- Unknown origin;
- Atypical duration.
- Identification of unusual behaviors with abnormality alerts for SIEM/SYSLOG;
- Algorithms developed by senhasegura are continuously adjusted to user behavior;
- Detailed dashboards provide visual representation of incidents and threats, allowing for quick action by the security team.
Technical features
The solution runs an analysis of the following variables:
- Workstation of origin;
- Target system;
- Credentials used;
- Denied access attempts;
- Time and length of session;
- Attempt to execute blocked commands;
- Execution of monitored commands.
Threat Analysis
What it is
A solution dedicated to environment monitoring in order to detect and send real-time alerts of any suspicious action performed with privileged credentials, allowing the security team to prevent an ongoing attack.
Benefits
- Reduced response time to attacks;
- Automatic blocking of stolen privileged credentials;
- Visibility of threats associated with privileged accounts;
- Access to all information associated with the incident.
How it works
A list of suspicious commands and behaviors in the environment is classified according to the level of risk. Whenever risk are identified, alerts are issued and consolidated on a graphic dashboard. The information security team can therefore take immediate action if necessary.
Features
- Graphic dashboards with risk and threat information;
- Alerts with detailed information about the occurrence of suspicious activity;
- Analysis of user sessions with record of abnormality in reports;
- Audit, command alert and blocking, even for privileged users;
- Recording of command input and output logs;
- Command scoring according to the level of risk of each command;
- Identification of lateral movement and privilege escalation;
- Sending suspicious activity alerts to SIEM/SYSLOG.
Technical features
- Self-learning of operating machine history and user behavior to identify any change that represents a threat;
- Scoring, monitoring, alerting and command blocking based on whitelist and blacklist;
- Automatic response for detection of threats without human intervention.
Privileged Information Protection
What it is
Storage of personal information, such as personal passwords and digital certificates.
Benefits
- Automated control of privileged information;
- Use of digital certificates for access to systems and services;
- Automated authentication using personal access credentials.
How it works
The solution manages the entire life cycle of stored information, such as when a digital certificate is close to expiring.
Features
- Digital certificates storage;
- Personal passwords storage;
- Alert on stored information expiration;
- User-friendly information search screen;
- Privileged information change and use logs;
- Permission to share information with other users.
Technical features
Support to ICP-Brasil validated digital certificates.
Hardcoded passwords
The world has been dealing with commercial computing for over half a century, but it still makes the same mistakes. One of them is the use of hardcoded passwords on systems and devices connected to the corporate network, making the company data an easy target for malicious attackers.
senhasegura allows for easy removal of hardcoded passwords and credentials from data sources through scripts, application codes, configuration files and SSH keys, via servers. The password vault connects to the main servers and synchronizes password change with the database. The application, therefore, does not lose connection.
The built-in application can access the senhasegura API at any time and receive the updated password for the resource to be accessed. In this way, this critical data will be inaccessible to all intruders and malicious users.
Password Reset
A password-free environment is still just a concept far from reality, despite being discussed for a long time. For now, the world is stuck with usernames and passwords, and no matter how secure the authentication solution may be, those credentials will not be phased out overnight.
Currently, a more secure approach for using passwords is when a password can only be used once. Single-use passwords protect users from credential theft. Unlike static ones, which don’t change, using passwords only once makes systems resistant to attack.
Once entered in senhasegura, passwords are managed by the solution’s password vault. This means that the vault can change the password at any time. These changes can occur in the following ways:
- Determined by the institution’s password policies (automatic): based on the company’s password policies registered in the system, the vault changes keys automatically and periodically, facilitating the task of the information security team;
- Determined by password exposure (automatic): When a user is authorized to view a password stored by the vault, the password can be used for a set period of time in the system. When this time is over, the vault will immediately change the password so that the credential returns to the vault custody;
- Requested by an administrator user: a user with administrator privileges in the vault can schedule a password change for some or all devices registered in the vault at any time.
Learn about all the benefits of protecting your information with senhasegura
Ensuring your company’s digital security does not need to be a concern when you apply the right solution. Our products serve to ensure the smooth operation of your company’s critical system.
Watch Demo
PAM core [3.18] – How to create a personal protected information – en-US
Cloud [3.18] – How to connect an Azure account to the Cloud module – en-US
PAM core [3.18] – How to create a new access group – en-US
PAM core [3.18] – How to change the keyboard layout and language in remote sessions – en-US
PAM core [3.18] – How to relate parent credential and slave credential – en-US
PAM core [3.18] – How to configure a domain – en-US
Orbit [3.18] – How to check the version license and updates of senhasegura – en-US
PAM core [3.20] – How to setup RDP session using admin – en-US
Gartner – Trends – en-US
PAM core [3.18] – How to setup an exceptional access – en-US
221 – Configurations – Orbit [3.18] – How to change hostname through simple commands – en-US
Gartner – What are the Secrets Management functionalities – en-US
PAM core [3.18] – How to setup an SMTP server – en-US
Orbit [3.18] – How to update senhasegura in a stand alone environment – en-US
PAM core [3.18] – How to add a new credential to the Vault – en-US
Orbit [3.18] – How to setup Wizard and activating the application – en-US
Orbit [3.18] – How to setup an NTP server – en-US
Cloud [3.18] – Conecting the AWS environment to the cloud module – en-US
Discovery [3.18] – How to create a Glossary of Devices – en-US
Discovery [3.18] – How to do ScanDiscovery in your network – en-US
senhasegura.go [3.20] – How to activate the offline mode of senhasegura.go – en-US
senhasegura.go [3.20] – How to enable the session recording of senhasegura.go – en-US
senhasegura.go [3.20] – How to setup the user expiration in the module Go – en-US
PAM core [3.20] – How to setup the JIT elevation of privilege – en-US
senhasegura.go [3.20] – How to setup an automation on senhasegura.go – en-US
senhasegura.go [3.20] – How to enable the Single Sign On in senhasegura.go – en-US
senhasegura.go [3.20] – How to configure the malware analisys in senhasegura.go – en-US
senhasegura.go [3.20] – How to install senhasegura.go – en-US
senhasegura.go [3.20] – How to setup the password withdrawal for senhasegura.go – en-US
senhasegura.go [3.20] – How to configure the approval workflow for senhasegura.go – en-US
senhasegura.go [3.20] – How to configure audit command in senhasegura.go – en-US
senhasegura.go [3.20] – How to setup the access list on senhasegura.go – en-US
senhasegura.go [3.20] – How to withdraw a credential from senhasegura.go – en-US
senhasegura.go [3.20] – How to setup execution and blocking messages in senhasegura.go – en-US
senhasegura.go [3.20] – How to setup automatic updates for senhasegura.go – en-US
Learn about all the benefits of protecting your information with senhasegura
Ensuring your company’s digital security does not need to be a concern when you apply the right solution. Our products serve to ensure the smooth operation of your company’s critical system.
Watch Demo
PAM core [3.18] – How to create a personal protected information – en-US
Cloud [3.18] – How to connect an Azure account to the Cloud module – en-US
PAM core [3.18] – How to create a new access group – en-US
PAM core [3.18] – How to change the keyboard layout and language in remote sessions – en-US
PAM core [3.18] – How to relate parent credential and slave credential – en-US
PAM core [3.18] – How to configure a domain – en-US
Orbit [3.18] – How to check the version license and updates of senhasegura – en-US
PAM core [3.20] – How to setup RDP session using admin – en-US
Gartner – Trends – en-US
PAM core [3.18] – How to setup an exceptional access – en-US
221 – Configurations – Orbit [3.18] – How to change hostname through simple commands – en-US
Gartner – What are the Secrets Management functionalities – en-US
PAM core [3.18] – How to setup an SMTP server – en-US
Orbit [3.18] – How to update senhasegura in a stand alone environment – en-US
PAM core [3.18] – How to add a new credential to the Vault – en-US
Orbit [3.18] – How to setup Wizard and activating the application – en-US
Orbit [3.18] – How to setup an NTP server – en-US
Cloud [3.18] – Conecting the AWS environment to the cloud module – en-US
Discovery [3.18] – How to create a Glossary of Devices – en-US
Discovery [3.18] – How to do ScanDiscovery in your network – en-US
senhasegura.go [3.20] – How to activate the offline mode of senhasegura.go – en-US
senhasegura.go [3.20] – How to enable the session recording of senhasegura.go – en-US
senhasegura.go [3.20] – How to setup the user expiration in the module Go – en-US
PAM core [3.20] – How to setup the JIT elevation of privilege – en-US
senhasegura.go [3.20] – How to setup an automation on senhasegura.go – en-US
senhasegura.go [3.20] – How to enable the Single Sign On in senhasegura.go – en-US
senhasegura.go [3.20] – How to configure the malware analisys in senhasegura.go – en-US
senhasegura.go [3.20] – How to install senhasegura.go – en-US
senhasegura.go [3.20] – How to setup the password withdrawal for senhasegura.go – en-US
senhasegura.go [3.20] – How to configure the approval workflow for senhasegura.go – en-US
senhasegura.go [3.20] – How to configure audit command in senhasegura.go – en-US
senhasegura.go [3.20] – How to setup the access list on senhasegura.go – en-US
senhasegura.go [3.20] – How to withdraw a credential from senhasegura.go – en-US
senhasegura.go [3.20] – How to setup execution and blocking messages in senhasegura.go – en-US
senhasegura.go [3.20] – How to setup automatic updates for senhasegura.go – en-US
檔案類型 | 檔案名稱 | 下載 | 分享 |
---|---|---|---|
資料表 | SEE HOW A PAM SOLUTION WORKS | ||
資料表 | RUN AS…ENDPOINT PROTECTION | ||
資料表 | MANAGEMENT OF THE LIFECYCLE OF THE DIGITAL CERTIFICATES | ||
資料表 | DevOps | ||
白皮書 | PCI DSS | ||
白皮書 | GDPR | ||
白皮書 | ISO | ||
白皮書 | LGPD | ||
白皮書 | NIST |
日期
標題
產品查詢
電話:(886) 02 7722 6899
電郵:sales@version-2.com.tw