Enterprise Vault™ Compatibility Charts
- About this guide
- Enterprise Vault core dependencies
- Storage devices, appliances, and software
- Exchange archiving
- Exchange archiving client compatibility
- File System Archiving (FSA)
- Domino mailbox archiving and journal archiving
- SharePoint archiving
- SMTP archiving
- Microsoft Teams Archiving
- Skype for Business Archiving
- Enterprise Vault Search
- Compliance Accelerator and Discovery Accelerator
- Compliance Accelerator
- Discovery Accelerator
- Antivirus software
- Third-party integrations
- Localization
- Appendix A. Changes to prerequisite software for Enterprise Vault 14
- Appendix B. Changes to prerequisite software for Enterprise Vault 15
- Appendix C. Revision history
Privilege Account Management (PAM)
PAM is used to mitigate the risk of privileged access. In other words, accounts, credentials and operations that offer an elevated (or "privileged") level of access. PAM tools are used by machines (software) and by people who administer or configure IT Infrastructure. A PAM solution can be deployed as on-premises software, SaaS or a hardware appliance.The core capabilities of PAM include:
Discovery of privileged accounts across multiple systems, infrastructure and applications
Credential management for privileged accounts
Credential vaulting and control of access to privileged accounts
Session establishment, management, monitoring and recording for interactive privileged access
PAM tools are typically used by organizations to rotate passwords of privileged accounts and maintain a record of all interactions in privileged sessions.
BeyondTrust Password Safe (PS) is your Just-in-Time (JIT) privileged access management solution that ensures your resources are protected from insider threats.
For more details, refer to https://www.veritas.com/support/en_US/article.100062424.