infoTECH Feature

August 29, 2013

Xceedium Offers Privileged Identity Management Protection to VMware vShield and vCloud

In order to secure and manage all activities associated with privileged accounts and serving the security concerns of storing data in the cloud, Xceedium has extended its security and audit capabilities to VMware vShield and vCloud.

Xceedium is a provider of privileged identity management for hybrid-cloud environments.

Xsuite’s security and audit capabilities enable customers to use VMware’s software-defined datacenter tools and its Private Cloud and Hybrid Cloud environments. It can leverage Xsuite to address essential privileged user security and compliance requirements.

It allows organizations to mitigate privileged user risks and address these regulatory mandates.

Xceedium CEO Glenn C. Hazard said in a statement, “This announcement extends Xceedium’s leading position in privileged identity management for VMware hybrid-cloud environments; We are pleased to have worked so closely with VMware to deliver this solution to the marketplace. We intend to continue this collaboration and quickly integrate Xsuite with VMware NSX and vCloud Hybrid Services (vCHS) as VMware makes software-defined datacenters a strategic imperative.”

Xsuite saves guest systems to run in VMware vSphere along with the VMware management console.

The company is expanding Xsuite access control, single sign-on (SSO), and graphical session recording capabilities to vCloud Director, vShield Manager, and vSphere Web Client.

Xsuite is capable of protecting both host systems from running VMware hypervisor, and the vSphere and vCloud management consoles. It saves infrastructure from the risks privileged users and systems administrators.

It also fulfills additional regulatory scrutiny and new security requirements for multiple industries including: FedGov/FISMA (NIST 800-53 revision 4), Retail/PCI DSS, and Energy/NERC (News - Alert) Critical Infrastructure Protection (NERC/CIP).

The company’s Xsuite allows customers to implement a zero trust security model and vaults privileged account credentials, implements role-based access control and monitors and records privileged user sessions. It offers seamless administration of security controls across systems, whether systems reside in a traditional data center, a private cloud, on a public cloud infrastructure, or a combination of environments.




Edited by Ryan Sartor
FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter

infoTECH Whitepapers