SAMA
SAMA allows initiating, implementing, maintaining, monitoring, and improving digital security controls in member organizations based on certain principles and objectives.
The Framework is related to other organizational policies in related areas, such as fraud management and physical security, but does not address non-cybersecurity criteria for these segments.
Banks, insurance companies, reinsurers, financiers, and credit agencies that operate in Saudi Arabia stand out among the member organizations that must comply with SAMA.
How do we help you with SAMA compliance?
senhasegura PAM solution enables the implementation of strict and more complex controls for privileged credential access in an automated and centralized manner, protecting IT infrastructure against data breaches and potential compliance violations.
senhasegura presents a set of solutions and features that provides compliance with SAMA controls. They are:
DOMUM: secures remote access for employees and third-party, providing zero trust-based access to the company’s network without the need for VPN.
PAM CORE: Discover and centralize all privileged credentials and create a strong authentication, authorization and accountability for its uses.
DevOps Secret Management (DSM): Manage secrets across heterogeneous environments in order to guarantee visibility, security and granularity access by applications.
GO Endpoint Manager: Prevent privilege abuses at Linux and Windows endpoints by securely controlling privileged credentials usage.
PAM Core – Management of the Full Cycle of
High Privilege Credentials
Centralized access management, with the objective of protecting and controlling the use of generic and high-privilege credentials, providing secure storage, segregation of access and full traceability of use.
When configuring access groups, you can define the administrator users who will be allowed to be given a physical access password and the group of users who can use the remote access provided by the solution to access a target device or system.
All cases can follow multi-level approval workflows and reasons provided by the requesting user.
Who is it recommended for?
senhasegura is a leading global solution in privileged access management with a mission to eliminate the abuse of privileges in organizations around the world.
The solution is recommended for companies in the following scenarios:
Companies with more than 10 users.
Companies that received points of attention in auditing.
Companies that must comply with cybersecurity rules and regulations.
Companies that want to implement the best security practices.
Companies that have suffered a security incident.
Companies that need to reduce operating costs.
World Recognition
In 2021, senhasegura was recognized as a Challenger in the Gartner Magic Quadrant report. In the same year, Gartner also named us among the top three PAM technologies in the world in its PAM Critical Capabilities report.
In addition, senhasegura was listed in Forrester’s Wave report for Privileged Identity Management 2018, which considered our access granularity among the best in the market. In addition, senhasegura was named a Leader by KuppingerCole in its Leadership Compass 2021 report.
Customer Testimonials
"The support service offered by senhasegura to the PAM solution has always been fast and efficient. The product meets the requirements of PAM in our organization and allows centralized management of various tasks with full traceability and control. senhasegura also offers its fast and intuitive interface, even for novice users."
Information Security Architect
"With its simple architecture, the implementation of senhasegura was quick and effortless for our Security and Infrastructure team. The tool offers complete high availability features and the deployment process is flexible, allowing it to be executed in phases. Asset discovery capability is above average, enabling you to correctly size the environment and the required effort. With all these features, senhasegura has enabled the mitigation of business and cybersecurity risks, including auditing of privileged user processes."