Integration with 3rd party SOAR response and mediation playbooks
Reporting with executive risk assessment reports
Universal MFA
For sample users
For 10% of the company size
For all users
Protect any resource with MFA
AD authentications
(including legacy systems, command-line interfaces, on-prem infrastructure, etc.)
Desktop logon
Azure AD
Okta
PingFederate
ADFS
RADIUS
Use any MFA type
Supporting all leading MFA methods
(mobile push, OTP, FIDO2, etc.)
Supporting all leading MFA providers
(Azure MFA, Okta Verify, PingID, HYPR, Duo, Yubico, RSA SecureID, etc.)
Silverfort MFA desktop and mobile app
(optional)
Phishing and MFA bombing protection
Cyber insurance compliance
(includes report)
Risk-based policies – respond to detected threats with step-up MFA verification
Service Account Protection
For sample users
For 10% of the company size
For all users
Service account discovery
Inventory of all service accounts
(name, group membership, attributes, behavior, etc.)
Classifications to different types
(M2M, hybrid, scanners, etc.)
Identify service accounts that are also used manually by admins
Discover privileges, interactive logins, broadly used accounts and more
Service account monitoring
Map all sources and destinations for each service account
Behavioral analysis of each service account’s unique activity patterns
Service account protection
Block or alert when service accounts are used outside their intended purpose
Automated access policy suggestion, based on the service account normal behavior
Policy automation and APIs, including ServiceNow integration
Discover and export a list of all privileged service accounts’ sources, destinations and dependencies to simplify and accelerate their onboarding to the PAM
(If needed)
Authentication Firewall
For sample users
For 10% of the company size
For all users
Apply identity segmentation rules to allow/deny access in different scenarios
Block access of users over insecure protocols
(NTLMv1, etc.)
Prevent PAM bypass by ensuring that privileged users can only access resources through the PAM
Risk-based policies – respond to detected threats by blocking access in real time