Discover the main functionalities and benefits from Excalibur solution¶
Info
The features list documentation can be found here.
Excalibur provides a seamlessly integrated Privileged Access Management and Multi-Factor Authentication solution that is easy to use, cost effective, phone-centric and passwordless.
Our solution ensures that the access to an organization's most valuable assets is as secure as it can be, with users only needing to scan a QR code to be authenticated, and Excalibur providing full auditability of the user actions, accessible securely at all times. Excalibur includes all the functionalities that you will expect from a Privileged Access Management solution that suits the needs of any organization (like passwordless authentication).
Moreover, once you implement Excalibur PAM to secure the access to a resource, you can stop exposing it to the internet, as everything will happen only through our platform.
Multi-Factor Authentication¶
Figure 1. Excalibur Multi-Factor Authentication
Feature | Description |
---|---|
Cross-platform mobile application. [M1] | Our mobile applications for the most common operating systems enable the users of any organization utilizing Excalibur to scan a QR code and provide access to the protected resources after successful verification of the authentication factors. Currently Available on: ➔ iOS App Store ➔ Google Play Store ➔ Huawei AppGallery |
Passwordless Authentication. [M2] | Excalibur fundamentally eliminates passwords as an authentication concept while maintaining compatibility with legacy systems by invisibly managing strong, auto-rotating credentials behind the scenes—freeing users from the security risks and frustrations of password-based access forever. |
In-house MFA. [M1, M3] | Excalibur provides a comprehensive multi-factor authentication system with: ➔ Standard factors: Biometrics, Phone ownership, Time, Date ➔ Advanced factors: Highly accurate, building-level precision geolocation that restricts authentication to specific locations (i.e., workplace and home) ➔ Custom combinations: Factors can be combined based on user roles and security requirements This approach makes it clearer that the geolocation is part of your broader MFA offering rather than a separate feature, which better represents how these components work together in your system. It also streamlines your feature table while making the full capabilities more visible. |
Remote Peer verification. [M1] | Excalibur supports dual approval authentication (4-eye principle) where sensitive resources or actions require verification from a second authorized user before access is granted. |
Offline mode. [M1] | If the mobile phone is offline, authentication on endpoints is still possible through an One-Time Password (OTP) |
Web-based Dashboard. [M3] | All Excalibur functions are accessible through a secure web-based dashboard with distinct interfaces for regular users and administrators — available exclusively after authentication. |
Excalibur as a SAML Identity Provider. [M2] | Excalibur can be used as a Multi-Factor Authentication solution for any application or service that is compatible with SAML protocol. |
Active Directory Identity Integration. [M4] | Excalibur seamlessly connects with existing Active Directory infrastructures to function as a centralized identity repository, streamlining user management for MFA-protected company resources. |
Passkey Support. [M1] | Excalibur includes native support for industry-standard passkeys, adding another authentication option to your security ecosystem. |
Device Integrity Verification. [M1] | Excalibur's device integrity verification system validates that connecting devices are genuine, unmodified, and security-compliant. Detects compromised devices (rooted/jailbroken), unauthorized system alterations, and potential security vulnerabilities before granting access. |
Privileged Access Management¶
Figure 2. Excalibur Privileged Access Management
Feature | Description |
---|---|
Centralized Management. [P1] | Everything is centrally managed from the web-based Excalibur dashboard. From here, administrators can enable privileged access for resources and users, according to different criteria and roles, and auditors can review users activities for auditing purposes and incident analysis. |
Privileged Access Enforcement. [P2] | Access to resources behind Excalibur is restricted to authorized users only. Temporary access can also be granted when needed, both for internal and external parties |
Streamed Access Management. [P3] | Excalibur's Streamed Access Management creates a secure intermediary layer between authenticated users and company resources. By streaming access rather than providing direct connections, it establishes a robust security architecture. The solution isolates protected systems from direct external access while enabling authorized users to perform necessary tasks. |
Searchable Session Recordings. [P3] | Every action the user takes is stored and recorded immediately and automatically. Users and administrators can review those sessions afterwards by the available filters or through a powerful text-based search. |
Automatic Password Rotation. [P1, P2] | Excalibur automatically rotates credentials after each successful login, transforming passwords into single-use tokens that become immediately invalid once used. This configurable rotation mechanism renders stolen credentials worthless to attackers, with fully customizable frequency and application policies. |
Multi-Tenancy. [P1] | Excalibur can be deployed in large environments requiring multiple tenants that will have fully separated access to resources as well as their own users and policies. This can be beneficial for large companies with multiple administrators for different sites as well as for Managed Service Providers. |
Auditing. [P1] | A comprehensive activity tracking system that logs all actions within the platform for security and compliance. Administrators can view detailed access histories, filter by parameters, and export audit logs for external review or storage. |
Import PAM Targets via CSV. [P4] | Streamline your deployment process with our CSV import feature, allowing administrators to quickly configure multiple privileged access targets in a single operation. This time-saving utility eliminates tedious manual setup and ensures consistent configuration across your protected resources. |
Download Transferred Files. [P4] | Download a copy of transferred files in PAM sessions. Support for file downloads using OAuth, enabling secure access and retrieval of files. |
Statistics. [P1] | The Statistics section provides administrators with a powerful tool for monitoring and analyzing system usage, user activity, and device interactions within the Excalibur environment. |
SIEM Integration. [P1-P6] | Integrate with Security Information and Event Management for security event logging. |
Privileged Systems API Endpoints. [P1] | The Excalibur API enables secure integration with backend services like PAM and MFA. Though just one element of the system, the v4 API provides key endpoints for managing privileged accounts, access policies, and audit functions. |