The 12Port Platform
The 12Port platform includes modules that support privileged access management, credential vaulting, remote access sessions and microsegmentation to secure modern infrastructure environments. It is designed for organizations operating across hybrid infrastructure, cloud environments, and distributed systems, where traditional perimeter security is no longer sufficient.
The platform provides visibility, access control, and policy enforcement across all layers of the stack, supporting Zero Trust principles and compliance requirements at scale.
Privileged Access Management (PAM)
Privileged Access Management controls and audits access to critical systems. It secures North-South access paths and minimizes risk from compromised credentials or unauthorized user behavior.
Capabilities include:
- Launching secure, recorded sessions via RDP, SSH, Telnet, VNC, IBM i, or browser-based protocols
- Enforcing multi-factor authentication before session initiation
- Recording session activity including keystrokes, file transfers, and clipboard use
- Routing access through secure gateways
- Automating approval workflows for elevated access
All privileged sessions are logged, recorded, and auditable.
Microsegmentation
Microsegmentation controls East-West movement within the network. It enforces communication policies between systems, workloads, and endpoints, limiting lateral movement during an incident.
Key features:
- Visualization of internal traffic patterns
- Tag-based policy creation and enforcement
- Automated firewall rule generation on supported endpoints (Linux, Windows, AIX, Solaris, IBM i)
- Policy violation detection and alerting
- Traffic-based recommendations for segmentation
Microsegmentation reduces exposure and isolates potential threats.
Secrets and Credential Management
The platform includes a built-in credential vault to store and manage secrets such as passwords, SSH keys, and API tokens. It helps eliminate static secrets and reduces the risk of misuse or theft.
Functions include:
- Secure storage of shared and privileged credentials
- Automatic password and key rotation
- Enforcement of complexity and format policies
- Self-service password reset with auditing
- Role-based access to secrets without direct exposure
Credential management ensures that sensitive access mechanisms are protected and governed.
Platform Integration and Deployment
The platform supports agentless deployment on Windows and Linux systems. It integrates with existing identity, asset, and infrastructure providers.
Integration options:
- Import assets from Active Directory, AWS, VMware, or CSV
- Connect to LDAP, Entra ID, Active Directory, or use the built-in user directory
- Support for TOTP, YubiKey (HOTP), Duo, Email, and RADIUS-based MFA
- Centralized policy and configuration management with multi-tenant support
- High availability and distributed deployment via peer nodes
The platform adapts to cloud-native, legacy, and hybrid environments.
Unified Security Approach
This platform unifies access control, internal segmentation, and credential protection into a single system.
It provides:
- PAM for controlling access to high-value systems
- Microsegmentation for restricting internal communications
- Secrets management for protecting credentials and keys
- Centralized policy enforcement and automation across environments
This integrated approach supports Zero Trust architecture and real-world operational demands.