Iraje Privileged Identity Management™

Product Focus:
Privileged Identity Management (PIM). Manage Privileged Accounts within an organization to ensure every action/activity of these users is auditable.

Product Description:
Iraje Privileged Identity Management (PIM) provides the following capabilities:

  • Shared Account Password Management
  • Privileged Session Management
  • Super User Privilege Management
  • Application to Application Management
  • Integration with AD Bridging Tools
  • Executive Reporting

Key Features:

  • Enterprise Single Sign On
  • Agentless & clientless solution
  • Secure browser (https) access to PIM
  • Supports Virtualization (Microsoft Hypervisor, VMware etc)
  • One Time Access
  • Time Restricted Access
  • Multiple AD integration
  • Command Level Controls (non-windows)
  • Standard Compliance Reports
  • SMS & Email alerts for defined events
  • Group based password changes
  • Maker-checker process for approvals
  • Script management with scheduler
  • Password stored encrypted in a secure vault
  • Change password of Windows, AIX, Unix, Linux, Sun Solaris, Databases, Network devices
  • Change password of services, IIS, webconfig files in applications
  • Manage hardcoded passwords
  • Highly scalable with redundant architecture
  • Highly secure format for video recordings
  • Multi Factor Authentication including centralized biometrics/OTP/Tokens
  • Role Based Access
  • 2 Factor Authentication on PIM Portal
  • i-RSA [2 Factor on target devices]
  • Auto Change Password
  • Alerts on defined events
  • Admin Discovery
  • Port Discovery
  • Command Restrictions on ssh sessions
  • Text logs and Video logs
  • Advanced Video on Demand with Active Mirror technology
  • Workflow Management System
  • Enterprise Password Management
  • Highly Scalable and Secure Architecture
  • i-DLP [Ability to restrict data transfer between target device and user desktops]
  • Auto Sync Password
  • Maker-checker process for approvals
  • Device Discovery
  • Active Connection Discovery
  • Blacklisting and whitelisting of commands on ssh sessions
  • Live Sessions and Recorded Sessions
  • Search commands within Videos
  • Element Management System

Product Architecture:

The solution architecture is highly scalable. It can support hundreds of users and thousands of devices.
It has multiple options to support active-active or active-passive architectures.
The solution is available as: Software, Appliance, Virtual Machine.


Iraje PIM provides the following benefits to enterprises

  • Identity & Access Governance
  • Enterprise Password Management
  • Simplified Audit & Compliance
  • Secure Cloud Environment Accesses
  • Secure Application Accesses
  • Complete Visibility and Control
  • Manage all Vendor Accesses more Effectively
  • Prevent Internal Frauds
  • Improve Overall Governance Risk and Compliance [GRC]

Application Area:
  • Enterprise datacentres to manage privileged user accounts
  • Compliance to regulatory requirements
  • Enterprise data security
  • Identity & Access governance

Iraje PIM supports Single Sign On to
  • All types of operating systems - Windows, Unix, Linux, AIX, Sun Solaris, Z OS etc.
  • All types of databases - Oracle, MySQL, MS SQL, DB2, Sybase, Ingress, Postgres, Hadoop etc.
  • All types of network devices - Routers, Switches, Firewalls.
  • All types of security, storage devices.
  • All types of thick clients - Toad, SQL developer, Checkpoint, SAP, VSphere, Lotus Domino, CISCO ASDM, XManager etc.
  • All types of applications/urls - CISCO ACS, McAfee Orchestrator, Palo Alto etc.

    Download     Screen Cam

© Copyright Iraje. All rights reserved.