Elevation Control (PAM)

☂️ Meets cyber security insurance requirement

What is it?

Elevation Control enables users to run specific applications as a local administrator, even when they do not have local admin privileges. Elevation Control puts IT administrators in the driving seat, enabling them to control exactly what applications can run as a local admin without giving users local admin rights. Elevation Control is a form of Privileged Access Management (PAM).

Why is it important?

Local administrator credentials are a sought-after target for cybercriminals. An attacker who has gained access to a user’s endpoint with local admin rights can impersonate other logged-on users or exploit tools locally, potentially pivoting into the entire network. Elevation Control enables IT administrators to eliminate the possibility of these credentials being hijacked and used against them without hampering productivity.

How it works:

Puma engineers deploy Elevation Control to train it on all existing applications. Our team then reviews the applications and selects which can be run as a local administrator. Once enabled, an end user can run the software as a local administrator without entering any credentials.

What are the benefits?

Complete Visibility of Administrative Rights

Gives you the ability to approve specific applications to run as an administrator, even if the user is not a local administrator.

Varied Levels of Elevation

Enables you to set durations for how long users are allowed access to specific applications by granting either temporary or permanent access.

Streamlined Permission Requests

Users can request permission to elevate applications and attach files and notes to support their requests.

Secure Application Integration

Smarter rules that are enforced ensure that users cannot jump to infiltrate connected applications within the network once applications are elevated.

Have questions about cyber security?

Let's reduce risk together

Contact us

42
entitlements to explore

Learn more about PUMA's Core, Core+, and Complete entitlements. Click one and learn how they work, why they are important, and their benefits.

Service Desk Core entitlements
Support For Your Staff

Service Desk Core

Supporting Your Technology

Service Desk Core

5 Ways We Support You

Service Desk Core

Access to Engineers

Service Desk Core

Fast SLA Guarantee

Service Desk Core

Asset & Inventory mgmt.

☂️ Meets cyber insurance

Account Management Team

Service Desk Core

Procurement & Sales

Service Desk Core

IT Strategy with vCIO

Service Desk Core

Identity Management

☂️ Meets cyber insurance

Security & LoB patching

☂️ Meets cyber insurance

Data Encryption Support

☂️ Meets cyber insurance

MFA Support

☂️ Meets cyber insurance

Vendor Management

☂️ Meets cyber insurance

Web traffic & Content Filter

☂️ Meets cyber insurance

NGAV - Virus License & Support

☂️ Meets cyber insurance

EDR & MDR license & Mgmt.

☂️ Meets cyber insurance

Security Baseline for Endpoints

☂️ Meets cyber insurance

PBX & Phone systems

Service Desk Core

Microsoft 365 Support

Service Desk Core

Network Support

Service Desk Core

License & SaaS mgmt.

Service Desk Core

ISP & Internet Mgmt.

Service Desk Core

Service Desk Core+ additional entitlements
Phishing Simulation

☂️ Meets cyber insurance

Vulnerability & Pen Testing

☂️ Meets cyber insurance

Security Awareness Training

☂️ Meets cyber insurance

DNS Advanced Filtration

☂️ Meets cyber insurance

Dark Web Filtration

☂️ Meets cyber insurance

Password Manager for Staff

☂️ Meets cyber insurance

HIPAA Platform & Mgmt.

☂️ Meets cyber insurance

Security Risk Assessment

☂️ Meets cyber insurance

Application Whitelisting

☂️ Meets cyber insurance

MDR + 24/7/365 SOC

☂️ Meets cyber insurance

Network Control

☂️ Meets cyber insurance

Ringfencing

☂️ Meets cyber insurance

Elevation Control (PAM)

☂️ Meets cyber insurance

Storage Control

☂️ Meets cyber insurance

Service Desk Complete
On site visits

Service Desk Complete

Unlimited Projects

Service Desk Complete