Passwork
Passwork is a self-hosted corporate password manager built for organizations that take security seriously. Designed and headquartered in Barcelona, Spain, Passwork meets GDPR, NIS2, ENS, and other European regulatory standards by default.
Every password and credential lives exclusively on your own server. A double-layer AES-256 encryption model — applied on both the server and client sides — combined with zero-knowledge architecture ensures your data never leaves your infrastructure. System administrators retain full, uninterrupted control.
Passwork holds ISO/IEC 27001 certification. Enterprises rely on it for secure password sharing, privileged access management, and centralized credential governance — all without exposing sensitive data to third-party systems.
Learn more
Securden Unified PAM
Securden Unified PAM is a comprehensive solution designed for privileged access security, enabling users to identify, store, categorize, share, manage, and monitor all privileged accounts, passwords, keys, documents, and various identities. This tool establishes a centralized system for managing passwords, automates procedures through approval workflows, governs access permissions, tracks and logs all interactions with essential IT resources, and promotes adherence to password security protocols.
The primary components of Securden Unified PAM include modules for password management, privileged account oversight, secure remote access, application governance, endpoint privilege regulation, management of privileged sessions, and SSH key administration. Additionally, the platform is aligned with numerous compliance standards such as NIS2, DORA, NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, ensuring rigorous security measures.
Installation is generally rapid, often completed in mere minutes, and organizations can expect to have a fully operational privileged access management system set up in under a month using Securden Unified PAM. Furthermore, this efficiency allows businesses to quickly enhance their security posture while minimizing disruptions to their ongoing operations.
Learn more
Securden Endpoint Privilege Manager
Securden Endpoint Privilege Manager (EPM) enables enterprises to remove admin rights without impacting productivity on Windows, Mac, and Linux endpoints. Securden EPM helps elevate applications for standard users and grant admin rights on a Just-in-Time (JIT) basis, eliminating standing privileges while ensuring users can run required applications without friction. Organizations can enforce application control using allowlisting and blocklisting to prevent unauthorized or risky software execution while enabling secure operations.
The solution supports on-demand application elevation and policy-based granular application elevation control, allowing security teams to define exactly which apps can run with elevated rights and under what conditions. Privilege management continues even on offline endpoints, ensuring protection for remote and traveling users. Built-in JIT local admin rights reduce risk by granting temporary elevation only when required.
Additional capabilities include application usage tracking for better policy decisions, continuous local administrator group monitoring to prevent privilege creep, and secure remote access for IT helpdesk teams to troubleshoot systems without exposing credentials. Securden EPM also helps organizations meet compliance requirements such as HIPAA, PCI-DSS, GDPR, and NERC-CIP. With a highly scalable architecture and a wide array of integrations, the platform delivers enterprise-grade endpoint privilege management while maintaining operational efficiency and user productivity.
Learn more
ThreatLocker
ThreatLocker is a Zero Trust security platform that stops cyber threats by allowing only approved applications and activity to run. It removes standing admin rights, enforces least privilege, and gives organizations precise control over software behavior. With capabilities like application control, ringfencing, and device and storage restrictions, it prevents ransomware, zero day exploits, and unauthorized actions before they can execute.
Purpose built for IT and security teams, ThreatLocker offers centralized management and full visibility across endpoints, users, and applications. It helps shrink the attack surface, restrict lateral movement, and meet compliance requirements with detailed auditing. Quick to deploy and easy to manage, the platform includes a large maintained application library and simplified approval workflows, enabling stronger security with less operational burden while keeping the business running smoothly.
Learn more