ARCON is proud to be recognized as Gartner Peer Insights Customers’ Choice 2021. Read More

x

CUSTOMER SATISFACTION IS OUR PRIORITY

WE ARE RECOGNIZED FOR OUR PREDICTIVE CAPABILITIES

Customer success story – A. K. Group

Amol Jawharkar

Group Head IT & CISO

We have Vendor Capability matrix which we narrow down to identify the correct vendor which fits our used case requirement. ARCON fit our requirement from day one and also caters to all the requirements compared to other vendors as given above.

INDUSTRY

Capital and Securities Markets

COMPANY SIZE

201-500

Product Implemeted

ARCON PAM

General Questions

The following emerging and existing day-to-day use cases necessitated us to deploy PAM  solution in our organization:

  • Distributed nature of our datacenters with multiple systems and applications adds to the complexities of having and managing too many privileged Ids. These large number of privilege IDs that connects with critical systems necessitates identity governance and accountability.
  • An ever-expanding IT ecosystem (end-users and devices) along with dispersed identities resulted in strong requirement for a Unified Access Control Engine.
  • To ensure and enhance the level of regulatory compliances.

We accessed Top PAM Solution in the Industry and ARCON came out to be leader in Overall Capability Score of Integration and Deployment & Service and Support from the below given products.

  • ARCON | Privileged Access Management (PAM)
  • CyberArk Privileged Access Security Solution.
  • Centrify Zero Trust Privilege.
  • Symantec Privileged Access Management
  • Manage Engine Password Manager Pro

Product Capabilities such as given below help us zero down to ARCON Solution

  • Control access to privileged accounts
  • Automatically randomize, manage, and vault passwords
  • Provide single sign-on (SSO)
  • Manage privileged operations
  • Eliminate hard-coded passwords
  • Integrate with authentication solutions
  • Manage privileged access

We have Vendor Capability matrix which we narrow down to identify the correct vendor which fits our used case requirement. ARCON fit our requirement from day one and also caters to all the requirements compared to other vendors as given above.

The implementation was completed in record time of 1 month along with Testing, UAT & Production Go live between DC - DR. AK Group team along has spent colossal efforts to get this implementation done within given timeframe under the leadership of Amol Jawharkar – Head IT for AK Group.

The implementation was completed in record time of 1 month along with Testing, UAT & Production Go live between DC - DR. AK Group team along has spent colossal efforts to get this implementation done within given timeframe under the leadership of Amol Jawharkar – Head IT for AK Group.

The deployment experience was inline to the expectation and Both AK Group IT team and ARCON as team ensured that the deployment and implementation was inline on track from day one.

  • ARCON fit our requirement from day one and also caters to all the requirements compared to other PAM requirement as stated above.
  • It is one of the best tools I have ever come across, which is a single framework for configuring all remote servers. We can securely access remote servers after signing into this program. We can first check with OTP that we will get a registered mobile number to login to this website. It's very easy to use.

Management of Privileged Access across enterprise has never been an easy task, yet we have absolutely had seamless transaction while moving our privilege users to ARCON. It has been a beautiful Identity and Access Management Tool given its capabilities and backed up by exceptional support by ARCON Direct Support.

The solution has enhanced the IT security framework of our organization. It has ensured:

  • Access management for VM/Servers-RDP, DB-SSMS and Linux-Command restrictions are implemented in the Organization.
  • Every session is getting captured in Logs & Video format, which helps to monitor each & every movement on on-boarded devices.
  • (We) can assign temp / permanent access to users as per the requirements, without sharing the credentials.
  • Every User is login from Single Sign on and MFA to ensure that the access is Secure and safe and complete DLP of the data is maintained and monitored.
  • To a very large extend close all the PAM related points for SEBI and RBI; thereby enhancing compliance to all regulatory points for secure accessibility to Infrastructure and Application.

Being in BFSI Segment, it has been imperative that we reduce the risk by eliminating unnecessary local admin privileges, block privileged credential theft attempts, auditing malicious behavior, strengthening the security of privileged accounts besides be compliant from RISK and Regulatory Perspective. Privileged access is deemed to be the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach. We would highly recommend the product with its ease of use and subsequent support which in our opinion shall provide them better Security.