Discover ManageEngine Password Manager Pro features

Discover ManageEngine Password Manager Pro features

ManageEngine password manager Pro is powerful password Management and IT security software helping users to handle all features of a system access management.

ManageEngine Password Manager Pro

ManageEngine password manager Pro consists of three models which manage remote and privileged sessions, this system is provided by tools and some features allow users to have full and effective password management in the entire organization using a central protected password store. Administrations are allowed to set password policies as they want and control user access to passwords and shared resources. One of the best ManageEngine password manager features is encrypting all user accounts, and storing them in one place, Then securing your system from authorization access through this tool you can avoid security threats, in addition, to prevent hacks in the same time of preventing compatibility issues.

The password manager is the best choice to help your company or organizations at:

  1. Prevent password misuse.
  2. Improve the safety behaviors of employees.
  3. Protect the access to accounts which include sensitive information about the companies, organizations, and customers.

There are 3 types of licenses in ManageEngine Password Manager Pro:

  1. Download the program for 30-days for evaluation, it can support 2 administrators at maximum, so you will be able to test the features of the Enterprise Edition.
  2. A free version of the software supports a single administrator and manages more than 10 resources forever.
  3. Registered Edition – The license is centered on two factors: 1- Edition sort: Standard Premium or Enterprise. 2- Number of Admins.

Ensuring your secure password storing and providing protection against intrusion are obligatory requirements for privileged account security, ManageEngine Password Manager Pro allows the following functions to reach required security methods: Passwords entered are encrypted using advanced encryption standards with storing in the database, so any attempt to hack the passwords from the database is less expected. Functions of the AES algorithm have been recommended and approved by the US government as one of the encryption standards. The detailed role-based user authentication mechanism ensures that users can only view passwords based on the authentication which was provided. All the transactions in the browser of ManageEngine Password Manager Pro are executed over HTTPS.

ManageEngine Password Manager Pro features

  • Discover, organize and store: store and organize your special identities in a central data vault.
  • Share safely: Securely share administrative passwords with your team based on needs.
  • Reset automatically: Automate the reset of passwords for databases, servers, network devices, or other resources.
  •  Access Control: Control the access to applications and IT resources based on job duties and roles.
  • Provide direct connection: Allow for direct contact with remote applications, websites, and IT resources.
  • Recording and review: Video recording and review of every privileged access with submitting a full report of all actions.
  • Central vault for passwords

Store all passwords, privileged, shared, and alert accounts, or any other accounts of your organization in a safe place, a centralized protected vault.

  • Common administrative passwords management

ManageEngine Password Manager Pro manages the shared accounts securely such as “Administrator” on Windows OS, “Root” on Unix/Linux, “enable” account in Cisco, and “sa” on SQL databases.

  • Workflow of the access control to passwords

Controls of requesting password recovery, exclusive powers, and synchronization with time-limited access.

Access permissions of passwords and sharing:

  • Only one specific ownership of passwords which are stored in the central vault.
  • Specific sharing of passwords based on needs.

LDAP Integration / AD – Active Directory Import users and user groups from Windows Active directory or LDAP. Take the advantage of the authentication mechanism. Role-based access controls Detailed constraints on resources management and passwords stored in PMP, Restrictions are applied based on predefined user roles.

  • Automatic password reset

One of the effective ManageEngine Password Manager Pro features is resetting passwords for remote resources using the web interface as often as needed automatically through scheduled tasks.

  • A wide range of target systems

It supports a lot of target systems, databases, and network devices for access control.

  • Password Management in integrated applications

Any application or even a script can query on PMP and recover passwords for communication with other databases or applications, then reduce built-in passwords.

  • Manage Windows service accounts

Determine and set passwords automatically for service accounts associated with the domain accounts.

  • Custom password reset script execution

An option to execute custom scripts automatically to perform any action after the reset passwords procedure.

  • Remote registration

Users can start secure, reliable SSH, Windows RDB, and Telnet sessions entirely from the web browser without using any kind of proxy or plug-in.

  • Recording privileged sessions

With this ManageEngine Password Manager Pro feature, you can record Privileged sessions triggered by PMP, also archive and replay for analytical review processes.

  • Automatically registration for target systems and websites

Login into target systems applications and websites automatically from PMP web without copying/pasting the passwords.

  • Exhaustive audit logs and reports

Complete record including who has used passwords. what they did do with it exactly? and when they used them. Easy-use reports on each password management scenario.

  • Real-time notifications, SIEM (Security Information and Event Management) integration

Get real-time notifications about different password events, then find out solutions and integrations.

  • Very safe and reliable

The best ManageEngine Password Manager Pro features all passwords and sensitive information are encrypted with AES 256-bit advanced encryption system, also double encryption to add more security layer, in addition, It can be configured to run in FIPS 140-2 compatible mode.

  • Two-factor authentication

Implement two successive stages of authentication for PMP registration. Regular authentication is the first stage and several options are available for the second stage.

  • Portable devices access

Recover passwords and accept requests on mobile applications with offline access. These applications are available for Windows, iPhone, and Android.

  • Live backup

Specific for Live and scheduled back-up on the entire database for disaster detection.

  • High accessibility structure

ManageEngine Password Manager Pro gives accessibility to organization passwords through release license distribution is considered enough for high accessibility.

  • Secure offline access

You can recover passwords even when you are offline, this offline version is completely as safe as the online one, available for mobile devices too.

If you need to learn more about ManageEngine Password Manager Plus features, contact us to get more details of this solution.

It-Pillars - Request A Demo

If you would like the Technical Support team to make a web-based demonstration of the product features, please fill the form below. Your technical questions will also be answered.

Frequently Asked Questions

When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, phone number, Company Name or other details to help you with your experience.

We collect information from you when you place an order, subscribe to a newsletter or enter information on our site.
 

We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:

  • To personalize your experience and to allow us to deliver the type of content and product offerings in which you are most interested.
  • To improve our website in order to better serve you.
  • To administer a contest, promotion, survey or other site feature.
  • To send periodic emails regarding your order or other products and services.
  • To follow up with them after correspondence (live chat, email or phone inquiries)
  • Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
  • We use regular Malware Scanning.
  • Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
  • We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information.
  • All transactions are processed through a gateway provider and are not stored or processed on our servers.
  • If there are any questions regarding this privacy policy, you may contact us using the information below.

    • www.it-pillars.com
    • #303, Salma Center, Medina Rd., Jeddah 23216, Saudi Arabia
    • info@it-pillars.com

We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.

 

We do not include or offer third-party products or services on our website.

 

Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users.

Google, as a third-party vendor, uses cookies to serve ads on our site. Google’s use of the DART cookie enables it to serve ads to our users based on previous visits to our site and other sites on the Internet. Users may opt-out of the use of the DART cookie by visiting the Google Ad and Content Network privacy policy.

We have implemented the following:

  • Google Display Network Impression Reporting
  • Demographics and Interests Reporting

We, along with third-party vendors such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions and other ad service functions as they relate to our website.

Opting out:

Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising Initiative Opt-Out page or by using the Google Analytics Opt-Out Browser Add-on.

How does our site handle Do Not Track signals?

We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.

Does our site allow third-party behavioral tracking?

It’s also important to note that we do not allow third-party behavioral tracking

COPPA (Children Online Privacy Protection Act)

  • When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
  • We do not specifically market to children under the age of 13 years old.
  • Do we let third-parties, including ad networks or plug-ins, collect PII from children under 13

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.

In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:

We will notify you via email

  • Within 7 business days

We will notify the users via in-site notification

  • Within 7 business days

We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law.

This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.

We collect your email address in order to:

  • Send information, respond to inquiries, and/or other requests or questions
  • Process orders and to send information and updates pertaining to orders.
  • Send you additional information related to your product and/or service
  • Market to our mailing list or continue to send emails to our clients after the original transaction has occurred.

To be in accordance with CAN-SPAM, we agree to the following:

  • Not use false or misleading subjects or email addresses.
  • Identify the message as an advertisement in some reasonable way.
  • Include the physical address of our business or site headquarters.
  • Monitor third-party email marketing services for compliance, if one is used.
  • Honor opt-out/unsubscribe requests quickly.
  • Allow users to unsubscribe by using the link at the bottom of each email.

If at any time you would like to unsubscribe from receiving future emails, you can email us at

  • Follow the instructions at the bottom of each email and we will promptly remove you from ALL correspondence.