下载PDF
BeyondTrust > 实例探究 > Zensar Technologies Enhances Privilege Management with BeyondTrust
BeyondTrust Logo

Zensar Technologies Enhances Privilege Management with BeyondTrust

技术
  • 网络安全和隐私 - 身份认证管理
适用功能
  • 商业运营
用例
  • 网络安全
服务
  • 系统集成
  • 软件设计与工程服务
挑战
Zensar Technologies, a leading technology consulting and services company, was facing a challenge with privilege distribution and management. The company often granted local administrator rights to users for day-to-day tasks or to install approved software. However, without the ability to define privilege scope, the support team at Zensar was working with limited control over how administrative rights were distributed. This lack of control could potentially conflict with critical software compliance policies and create a bloated attack surface. The team sought a tool that would enhance their privilege management capabilities without disrupting their existing mandatory compliance policies and processes. They also wanted a flexible system for access controls, allowing the IT team to generate new policies and roles based on unique end-user requirements. Lastly, they needed a way to quickly generate privilege reporting across all endpoint assets and users.
关于客户
Zensar Technologies is a leading technology consulting and services company with over 10,000 employees across 33 global locations. The company provides engineering, design, marketing, and management services to many of today's highest-growth enterprises, helping them become more agile, disruptive, and innovative. Zensar offers expertise in a wide array of industries, including hi-tech, banking & financial services, insurance, healthcare, and manufacturing. The company is based in India.
解决方案
To solve their privilege distribution and management challenges, Zensar chose BeyondTrust Endpoint Privilege Management. With this solution, the Zensar team was able to successfully confine software installation and uninstallation, while continuing to issue the privileges and rights needed for users to complete day-to-day activities. They created numerous user definitions, application whitelists, and other policies that aligned them closer to software compliance requirements. According to Zensar, alternative Privileged Access Management (PAM) solution offerings from other vendors had limited features in comparison to BeyondTrust, and often required a bundled software deployment. Customizable whitelisting options were also not offered by competitors – a key requirement due to the company’s internal processes and policies. BeyondTrust met all the feature and security requirements of the Zensar team, both basic and advanced.
运营影响
  • Endpoint Privilege Management quickly helped Zensar remove local admin rights, while improving the user experience and optimizing IT operations.
  • Role-based access control and agent management features helped Zensar harden endpoint security without impacting user or agent productivity.
  • Auditing and forensic features helped the team meet compliance requirements, generate audit trails, and provided detailed audit reports.

相关案例.

联系我们

欢迎与我们交流!

* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

Thank you for your message!
We will contact you soon.