Skip to content

Welcome to the 12Port Documentation Portal

What is the 12Port Platform?

The 12Port platform includes modules that support privileged Account Management, Credential Vaulting, Remote Access Sessions and Microsegmentation to secure modern infrastructure environments. It is designed for organizations operating across hybrid infrastructure, cloud environments, and distributed systems, where traditional perimeter security is no longer sufficient.

The platform provides visibility, access control, and policy enforcement across all layers of the stack, supporting Zero Trust principles and compliance requirements at scale.


Privileged Access Management (PAM)

Privileged Access Management controls and audits access to critical systems. It secures North-South access paths and minimizes risk from compromised credentials or unauthorized user behavior.

Capabilities include:

  • Launching secure, recorded sessions via RDP, SSH, Telnet, VNC, IBM i, or browser-based protocols
  • Enforcing multi-factor authentication before session initiation
  • Recording session activity including keystrokes, file transfers, and clipboard use
  • Routing access through secure gateways
  • Automating approval workflows for elevated access

All privileged sessions are logged, recorded, and auditable.


Secrets and Account Management

The platform includes a built-in credential vault to store and manage secrets such as passwords, SSH keys, and API tokens. It helps eliminate static secrets and reduces the risk of misuse or theft.

Functions include:

  • Secure storage of shared and privileged credentials
  • Automatic password and key rotation
  • Enforcement of complexity and format policies
  • Self-service password reset with auditing
  • Role-based access to secrets without direct exposure

Credential management ensures that sensitive access mechanisms are protected and governed.


Microsegmentation

Microsegmentation controls East-West movement within the network. It enforces communication policies between systems, workloads, and endpoints, limiting lateral movement during an incident.

Key features:

  • Visualization of internal traffic patterns
  • Tag-based policy creation and enforcement
  • Automated firewall rule generation on supported endpoints (Linux, Windows, AIX, Solaris, IBM i)
  • Policy violation detection and alerting
  • Traffic-based recommendations for segmentation

Microsegmentation reduces exposure and isolates potential threats.


Platform Integration and Deployment

The platform supports agentless deployment on Windows and Linux systems. It integrates with existing identity, asset, and infrastructure providers.

Integration options:

  • Import assets from Active Directory, AWS, VMware, or CSV
  • Connect to LDAP, Entra ID, Active Directory, or use the built-in user directory
  • Support for TOTP, YubiKey (HOTP), Duo, Email, and RADIUS-based MFA
  • Centralized policy and configuration management with multi-tenant support
  • High availability and distributed deployment via peer nodes

The platform adapts to cloud-native, legacy, and hybrid environments.


Unified Security Approach

This platform unifies access control, internal segmentation, and credential protection into a single system.

It provides:

  • PAM for controlling access to high-value systems
  • Microsegmentation for restricting internal communications
  • Secrets management for protecting credentials and keys
  • Centralized policy enforcement and automation across environments

This integrated approach supports Zero Trust architecture and real-world operational demands.