SecurityBrief US - Technology news for CISOs & cybersecurity decision-makers
Flux result 43638662 ed38 47d6 8ce9 8739c9cac94f

Keeper boosts endpoint privilege governance for firms

Wed, 15th Apr 2026

Keeper Security has added approval governance and monitoring features to its Endpoint Privilege Manager, aimed at large organisations managing privileged access across distributed IT environments.

The update introduces a central approval framework in the Keeper Admin Console, where elevation requests can be managed through role-based approvers, escalation paths and configurable approval windows. The new controls are designed to replace permanent administrative access with temporary, policy-based elevation.

The release also adds tighter expiration validation and workflow enforcement, measures intended to limit lingering privileges and support separation of duties for organisations with compliance and regulatory requirements.

Access Controls

Endpoint privilege management has become a growing focus in corporate security as companies try to reduce the risks associated with standing access on employee devices and servers. Permanent elevated access has long been a target for attackers because it can provide a path across systems once a machine or account is compromised.

Keeper's latest changes apply to Windows, macOS and Linux endpoints. In the admin console, administrators can now track privilege elevation activity as requests are made, with more detailed status information and audit logging that includes correlation identifiers for tracing events.

That added visibility is paired with automated monitoring intended to maintain enforcement across managed endpoints. Organisations can also apply more granular policies to control how privileges are granted and supervised across different systems.

Keeper says its Endpoint Privilege Manager applies least-privilege rules through policy-driven temporary elevation. Elevation data remains encrypted locally and can only be accessed by authorised administrators through the Keeper Admin Console.

Compliance Focus

The update reflects broader demand from larger companies for more formal governance around privileged access, particularly as security teams face tighter audit expectations and greater scrutiny of administrative controls. Approval workflows, expiry settings and event records have become routine requirements for firms seeking to show that privileged access is granted only when needed and for a limited time.

Keeper positions the changes as part of its broader privileged access management offering. In practice, the new features are designed to give security and IT teams more direct oversight of when access is requested, who approves it and how long it remains in place.

Craig Lurey, Chief Technology Officer and Co-founder of Keeper Security, linked the release to the need for tighter operational controls.

"Privilege management is most effective when governance is built into every elevation," he said. "Security teams need structured approval paths, strict time controls and immediate visibility into what's happening across their endpoints. The enhancements to Keeper Endpoint Privilege Manager strengthen that control layer. Elevation becomes deliberate, bounded and fully auditable. That's how you reduce standing privilege and operate confidently at enterprise scale."

The product is intended for enterprises that want least-privilege enforcement alongside clearer accountability for administrative access. The updated governance model gives security teams a more consistent way to manage elevated permissions across endpoint fleets while preserving records of approvals and activity.

The announcement comes as companies across Asia Pacific and other regions adapt security controls to broader technology shifts, including increased AI deployment and stricter cybersecurity obligations. In that environment, privileged access management has become a central issue for organisations trying to reduce operational risk without disrupting day-to-day work.

For endpoint security teams, one practical challenge is balancing speed with oversight. Workers and administrators often need short-term elevated rights to install software, update settings or troubleshoot systems, but security teams want those permissions to expire promptly and leave a clear audit trail.

Keeper's new controls are aimed at that gap, with approval windows, escalation paths and expiry checks built into the request process. The result is a model in which administrative privileges are granted intentionally, limited in time and visible to security teams across all endpoints.