Learn how we transform creative ideas into tangible value, helping our customers achieve unparalleled business growth.
You can use a filter to find the information you need.
The developed product gives organizations the ability to grant secure remote access to privileged users while increasing their operational efficiency. It grants controlled access without leaving a footprint on the network, connects individuals to their authorized areas, and centralizes session recording and reporting. Thus, global organizations rely on this product to protect their most critical IT infrastructure and data assets.
The leading provider of privileged identity and access management solutions for hybrid-cloud enterprises
Network Security Software
To grant secure remote access to privileged users to any computer within the corporate network.
A centralized IT operations management portal provides secure remote access control and all of the tools necessary to provide efficient remote administration. The solution connects authorized users through a secure channel to a wide variety of remote systems, consoles, devices, and control points.
Java, Smart Card, JIDE
ELEKS develops and supports a solution that allows users to remotely access and work on any computer within the corporate network. User actions are recorded so that an administrator can review an audit trail of the user’s entire work session by replaying the recorded sessions on a DVR-style player created by ELEKS. This equipment allows administrators to watch the recorded session like a video, with the ability to pay particular attention to place-marks that are automatically added by the server. Forbidden and suspicious user actions are detected by the system and are available for an administrator’s review.
ELEKS works mainly at implementing different remote access protocols (RDP, VNC, CLI, Web) through the product as well as monitoring its access (tracking violations and session playback):