Công Ty Cổ Phần Công Nghệ Nessar Việt Nam - Nessar

Logo
En

SENHASEGURA

PAM Security Appliance

PAM Security Appliance Increased security and performance for your PAM solution. What it is Appliance-based hardware solution with custom operating system and embedded proprietary database...

View more

Privileged Change Audit

Privileged Change Audit Ensure that actions are performed correctly. What it is The Privileged Change Audit feature is dedicated to protecting groups of devices and...

View more

Cloud Identity and Access Management

Cloud Identity and Access Management The world has changed a lot in recent years, not only in how business is conducted, but also in how...

View more

Privilege Management Linux

Privilege Management Linux Restrict user privileges on Linux endpoints. What it is senhasegura.Go for Linux allows the execution of Run As function on local endpoints...

View more

DevOps and Secret Management

DevOps and Secret Management Senhasegura is fully compliant with DevOps environments. DevOps and Secret Management Currently, the software delivery pipeline is focused on delivering high...

View more

Privilege Management for Windows Endpoints

Privilege Management for Windows Endpoints Restrict user privileges on Windows workstations. What it is Allows the execution of Run As feature on local workstations to...

View more

Privilege Management Linux

Privilege Management Linux Restrict user privileges on Linux endpoints. What it is senhasegura.Go for Linux allows the execution of Run As function on local endpoints...

View more

DevOps and Secret Management

DevOps and Secret Management Senhasegura is fully compliant with DevOps environments. DevOps and Secret Management Currently, the software delivery pipeline is focused on delivering high...

View more

Privilege Management for Windows Endpoints

Privilege Management for Windows Endpoints Restrict user privileges on Windows workstations. What it is Allows the execution of Run As feature on local workstations to...

View more

Application Identity

Application Identity Eliminate hard-coded passwords and identify privileged accesses. What it is It’s possible to delete credentials embedded in source codes, scripts and configuration files,...

View more

SSH Key Management

SSH Key Management Securely control the SSH key cycle. What it is Secure storage, rotation and access control for SSH key protection. Benefits Blocking unauthorized...

View more

SaaS Access Management (PAM)

SaaS Access Management Fast and easy protection of privileged access. The compliance with current standards and regulations (LGPD; DGPR; PCI DSS; ISA 62443; among others)...

View more

Privileged Change Audit

Privileged Change Audit Ensure that actions are performed correctly. What it is The Privileged Change Audit feature is dedicated to protecting groups of devices and...

View more

Cloud Identity and Access Management

Cloud Identity and Access Management The world has changed a lot in recent years, not only in how business is conducted, but also in how...

View more

PAM Security Appliance

PAM Security Appliance Increased security and performance for your PAM solution. What it is Appliance-based hardware solution with custom operating system and embedded proprietary database...

View more

FREQUENTLY ASKED QUESTIONS

Synthesize the most frequently asked questions for customers as well as consultants

TYPICAL CUSTOMERS