Pega Selects Ironsphere for Enhanced Security for AWS CRM Systems
Global Leader in Cloud Software Embeds Ironsphere’s Privileged Access Management Software to Restrict Access and Protect Assets
Jersey City, NJ; July 14, 2020 – Ironsphere, a secure access management software, and services company serving large enterprises and telecom service providers, has announced Pegasystems Inc., the software company empowering digital transformation at the world’s leading enterprises, has selected Ironsphere’s Privileged Access Management (PAM) software to further secure its Amazon Web Services (AWS)-hosted CRM as-a-service offerings.
Pega is the leader in cloud software for customer engagement and operational excellence. Its AI-powered software helps the world’s leading organizations optimize customer interactions on any channel while ensuring their brand promises are kept. Pega’s low-code application development platform allows enterprises to quickly build and evolve apps to meet their customer and employee needs and drive digital transformation on a global scale. With many of its cloud-based solutions running on AWS, Pega needed a secure PAM solution that worked in its deployment model of Pega Cloud®. After a rigorous evaluation process, Pega ultimately selected Ironsphere.
Due to the nature of cloud solutions, instances (virtual servers) are created or deleted within minutes based on demand, which means that technology infrastructure is much more dynamic than on-prem infrastructure, and requires an agile approach to managing and restricting privileged users, including admins, DevOps, and IT support.
“At Pega, we work with many of the world’s largest and most complex organizations, and it is our priority to continue delivering secure solutions for our clients,” said Frank Guerrera, Chief Technical Systems Officer, Pegasystems. “Ironsphere’s architecture and scalability delivers a high security standard while enabling continuous, fast, and lower cost operations, so our clients can continue to feel confident in the security of their cloud services.”
Ironsphere’s Cloud-PAM supports integration with AWS Inventory (Device and Tag Management APIs) so that created/deleted instances are auto-discovered, and privileges are auto-assigned or removed. Admins are presented a unified inventory list based on their roles and are always able to connect to instances smoothly (without knowing the instance credentials) while all sessions are silently recorded for security and regulatory compliance.
“We are extremely proud to support Pega in their continued growth in the enterprise cloud services market,” said Michael Fritzlo, Executive Chairman, Ironsphere. “As a leader in cloud-based PAM, made possible by our advanced software-defined platform and solutions, Ironsphere has invested in cloud-native solutions, unlike competitors who are struggling to retrofit expensive, legacy technologies into a cloud-first world. We recognized this opportunity early, and acted upon it by investing in greenfield PAM. Our architectural and investment decisions supported Pega’s adoption for AWS-hosted services, and by the choice of Ironsphere by some of the largest communications service providers, banks, and other industries who rely on secure, real-time applications.”
Centrally managed, Ironsphere’s AD (Active Directory) integration-backed role-based authorization management saves on configuration overhead and ensures consistent access rules across all target servers, with transparent user and role management. Ironsphere’s Session Manager’s logging and reporting capabilities combined with policy tracking options facilitate easy and on demand audit trails with adjustable level of verbosity.
“Ours is a security solution which enables our customers to maintain continuous operations without sacrificing security practices,” Fritzlo said. “And ours is a solution that can be implemented in days or weeks, not months or even years, which is light years ahead of the first generations of PAM.”
Ironsphere is a software company established in 2016 providing advanced technology software in the fields of Access Control Systems, Privileged Task Automation and Next-generation Security and Audit. With the world’s most cost-efficient, flexible, and easily deployed Access Control software, our technology platform supports many global telecom service providers and large enterprises. Our core offering is a Privileged Access Management (PAM) solution protecting enterprise resources, used as an engineering access, information security and governance tool to prevent internal data breaches and malfeasance using privileged accounts. We enable IT managers and network admins to efficiently gain secure access, control configurations and indisputably record all activities within their enterprise infrastructure, preventing the material impact a breach may have on business operations and continuity. Learn more at www.ironsphere.com.
Securing Increasingly Decentralized Corporate Environments in 2021: Changes and Challenges for Access Management
It is understandable that many IT leaders are solid fans of the centralized approach to cybersecurity, arguing that it allows companies to better assess and manage their risks by being able to control every application, device and access privilege, by user.read more
The debate on centralized vs. decentralized IT has been going on for decades, and there are solid arguments for both choices. The rise of the cloud changed everything, and today “shadow IT” continues to challenge CIOs and CISOs who are charged with protecting the assets of their organizations while also not restricting the number of productivity tools available which employees and contractors continue to find and use rather than using “official” applications.read more
2020 was a year of tremendous chaos and stress on many levels and stretched the limits of IT teams who were responsible for securing corporate assets, as entire companies sent employees home to work, including those same IT teams. A new generation of IT heroes was born, and CIOs, CISOs, and IT analysts and managers stepped up to address uncommon challenges, even as cyberattacks grew to all-time highs.read more