PAM
Privileged Access Management for Hybrid Environments

Administer privileged SSH access to physical or cloud devices. From network devices, to servers, and anything capable of SSH.

See how ITVA secures your network access

Provision Users an ITVA account

Choose how you want users to access ITVA. Okta, Google, Microsoft Entra,
or simply local accounts .

Grant Device Access

Control what devices each user can access with custom policies.

Proxied Logins

ITVA will proxy access to the device, ensuring credentials are never shared
to the user.

Logging and Reporting

All sessions are logged and recorded enabling session replays. Receive automated reports of all configuration changes and by whom.
User Access Request
Authenticate
Access Control
Proxied Access
and more...

Secure by Design

Our Privileged Access Management system is secured by how it's designed leveraging a zero-trust architecture.
Diagram Depicting ITVA's secure connection from the probe to ITVA cloud

How do we secure our PAM?

  • Only encrypted credentials need to be stored in the ITVA Cloud App.
  • The probe, which is entirely managed by you, contains the decryption key. During access, the probe will decrypt the stored encrypted credentials and proxy access.
  • Unencrypted credentials never need to be stored or seen by ITVA!
  • Restrict access on your probe based on your specific security requirements.
  • This design ensures access is valid from user login, within the ITVA Cloud App, locally on your probe, and on the end device itself. Providing unparalleled layers of security.

Granular Access and Control

Provide access with the level of security required by your business.
  • Administer access on a per device level, giving you the granularity you need.
  • Users never see the credentials, removing the need to rotate credentials on personnel change.
  • Revoke access in real time, removing time gap within the offboarding access.
  • Add Multi Factor Authentication login for any device capable of SSH, enable more secure login even with native MFA support.
  • Audit logs of access and replay SSH sessions to maintain complete visibility on access and changes.