Fudo PAM

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)Fudo Security
Websitehttp://www.fudosecurity.com
Company size (employees)50 to 99
Type of solutionSoftware

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

*Based on AI-backed mouse moves, Fudo PAM’s biometric analysis knows in seconds
that the session was taken over by an unauthorized user.

*All the ongoing sessions are being monitored, and, whenever something suspicious is
taking place, Fudo PAM sends alerts to the designated security personnel.

*Fudo’s award-winning technology has been recognized by clients, Gartner, and
KuppingerCole analysts in their recent studies.

Brief Overview

Fudo enables secure remote access to the company’s IT resources. It covers all possible scenarios: from 3rd party contractors accessing your critical infrastructure to thousands of employees accessing their office workstations from home. Remote users can access monitored systems through a proxy or by using a convenient Web Access Gateway, which can be published over the Internet for a VPN-less experience and still maintain a high level of encryption and infrastructure separation backed by Fudo’s built-in SSH and RDP protocol web clients and use of multi-factor authentication schemes.

With Fudo’s ability to separate user credentials from IT infrastructure credentials and just-in-time session setup, Security Officers can deploy a ZTNA-backed access scenario in a matter of hours. Third parties can access your infrastructure without knowing the password to connect to servers, and users can work remotely regardless of the state of their endpoints – using User Access Gateway’s built-in RDP and SSH web clients virtually all trojans and rootkits cannot cross-over. And with a token/one-time-password authentication required for a login, even keyloggers are out of the picture hunting login data for malicious third parties.