About Us
About Us
More Information
Who Are We
Our Management and Sales Staff
Our Business Partners
Our Awards
Management Systems and Certificates
References
Success Stories
Our Corporate Identity Design
Services
Services
More Information
Technical Support Services
Managed Services
Maintenance Agreements
Penetration Test and Vulnerability Analysis Services
Consultancy
Technical Services
Outsourcing Staff Hold
Solutions
Solutions
More Information
Network Solutions
Server & Storage Solutions
Information Security Solutions
Complementary Solutions
Lenovo
Software Solutions
Software Solutions
More Information
Digital Automation and Integration
Security Software Solutions
Dynamics 365 CRM
Microsoft Business Applications
Delinea (Thycotic) Software and Services
Adobe
HCL Software and License Procurement Service
Datasoft Commercial Applications
Our Brands
Our Brands
More Information
Corporate Social Media Monitoring Management
CoMex Contract Management
PMEX Demand and Purchasing Management
ScanPro Document Scanning and Indexing Application
Media
Media
More Information
Agenda And News
Video Gallery
PDF Library
Blog
Contact
Contact
More Information
Contact Us
Human Resources
GDPR General Clarification Text
Customer Support Portal
TÜRKÇE
Close
Software Solutions
|
Security Software Solutions
|
Privileged Access Management (IBM-PAM)
Keeping Privileged Credentials and Isolated, High-Security Environment to Control Access to Them
Privileged Access Management (IBM-PAM)
Privileged Access Management (PAM) is a technology product establishing an isolated, highly secure and tightly controlled environment to keep privileged credentials and control access to them.
BBS prefers
IBM Security Verify Privilege
or
Delinea (Thycotic)
Secret Server solution, which is basically the same in the Corporate projects it serves, and has an easy-to-use web-based interface to help organizations manage “privileged or risky identities” and achieve their goals
With Privileged Access Management (PAM), you can
Secure privileged or risky identities such as system administrators, database administrators, social media accounts, internet banking accounts, bank or credit card information.
Prevent employee threats and errors by auditing privileged accounts.
Ensure that the passwords of users such as Active Directory Domain Admin, “root” user of Unix/Linux systems, and “sa” of SQL server are never known.
Record when users use privileged accounts and what commands they run.
Record sessions opened with privileged accounts as video, watch them live, block various commands in command line connections and search within these recorded commands.
BBS has been successfully providing the following services to its customers for many years with its experienced and competent software team.
System Setup
Cluster Configuration
System Administrator and End User Trainings
Health-check
System Migration
Version Update
Maintenance & Support
Consulting & Application Development
Integration
Thycotic and Centrify, two major Privileged Access Management (PAM) manufacturers which are at industry-leading positions were merged in March 2021 and the brand's provisional name became ThycoticCentrify. Based on the power of this merger, we are pleased to announce to you, our valued customers, that the name of the brand is now Delinea and we look forward to introducing you.
Bilgi Birikim Sistemleri believes that offering the “right solution” to the customer is the greatest value. It has been serving in this field for years aiming to adhere to the determined project budget and complete it on time. In this context, it has realized many successful projects with its competent and experienced personnel. Please give us an opportunity to contact you so that we can introduce our work and offer you the right solution.
Related Reference
Contact Form
I have read and accept
the KVKK clarification text.
SEND
You may be interested
IBM Security Identity Manager (ISIM)
More Information
IBM Security Verify Governance (ISVG)
More Information
IBM Security Verify Access (ISVA)
More Information