Share this article on:
SecureLink has announced new features have been added to its Vendor Privileged Access Management (VPAM) platform to simplify the management of vendor privileged access to organization’s systems, files, and applications.
SecureLink’s VPAM platform was developed to improve remote access security and give organizations full visibility into remote access sessions. While the platform can be used by all organizations to improve vendor privileged access management, the platform is most commonly used by highly regulated enterprise organizations and technology vendors. The platform has now been adopted by more than 30,000 organizations worldwide across a wide range of industry sectors.
The SecureLink platform is constantly evolving, with new capabilities and features regularly added. The latest updates include mobile authentication capabilities and new tools to simplify and automate administrative functions and ensure compliance with federal and industry regulations.
“With this release, our customers will have greater visibility into the security of their server configurations, along with system customization capabilities that include mobile authentication from off-the-shelf suppliers,” said Rob Palermo, vice president of product management for SecureLink.
New mobile authentication capabilities have been incorporated into the platform, including multi-factor authentication for mobile devices. MFA can now be added using third-party applications of the customer’s choice, including Authy and Google Authenticator, which can be managed through the SecureLink UI.
A Software Development Toolkit (SDK) has been released that allows common administrative functions to be automated, including creating, reading, updating, and deleting SecureLink users, applications and vendors.
To help organizations ensure compliance with regulations such as PCI, NERC, HIPAA and CJIS, SecureLink has released a Best Practices Checklist. The checklist provides visibility into the configuration of the platform. A numerical score is assigned which is based on the current configuration. The checklist shows whether security best practices have been followed, where there are issues that can be resolved, and whether the current configuration meets regulatory requirements.