Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

The ARCON | Endpoint Privilege Management solution (EPM) provides endpoint privileges in a ‘just-in-time’ or ‘on-demand’ manner while overseeing all end users on your behalf. This tool is adept at identifying insider threats, compromised identities, and various malicious attempts to infiltrate endpoints. Equipped with a robust User Behavior Analytics component, it monitors typical behaviors of end users, thereby recognizing unusual behavior patterns and other entities within the network. A unified governance framework allows you to blacklist harmful applications, restrict data transfers from devices to removable storage, and offers meticulous control over application access with the capability for ‘just-in-time’ privilege elevation and demotion. Regardless of the number of endpoints resulting from remote work and access, you can secure them all with this singular endpoint management solution. Enjoy the flexibility of elevating privileges at your discretion, whenever it suits you. Plus, the ease of managing all these features through one platform enhances the overall security experience significantly.

Description

LynxSecure® functions as a programmable processor partitioning system that leverages hardware virtualization to effectively isolate computing resources. Its distinctive design, which focuses on least-privilege principles coupled with a fine-grained distributed resource control model, underpins the Lynx MOSA.ic™ Modular Development Framework. This framework aims to foster trust among customers, partners, and stakeholders by facilitating the development of innovative software platforms that significantly reduce costs, risks, and time in the creation and deployment of safe, secure, and connected mission-critical systems utilized in both manned and autonomous military, aerospace, and federal applications. Unlike traditional methods that rely on issuing commands to platform APIs as dictated by a programming manual, LynxSecure empowers developers to directly influence system behavior through a unique system architecture specification that they create, with enforcement carried out exclusively by the processor. This direct control enhances the precision and adaptability of software development in high-stakes environments.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

ARCON | Privileged Access Management
ARCON | SCM
ARCON | UBA
Rapita Verification Suite

Integrations

ARCON | Privileged Access Management
ARCON | SCM
ARCON | UBA
Rapita Verification Suite

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

ARCON

Founded

2006

Country

India

Website

arconnet.com/endpoint-privilege-management/

Vendor Details

Company Name

Lynx Software Technologies

Country

United States

Website

www.lynx.com/products/lynxsecure-separation-kernel-hypervisor

Product Features

Application Development

Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Alternatives

Devolutions PAM Reviews

Devolutions PAM

Devolutions

Alternatives

Acculynx Reviews

Acculynx

Exact Logix
LEASSV Reviews

LEASSV

Lynx Information Systems