Problems that solves
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
Risk of attacks by hackers
Risk of data loss or damage
Risk of lost access to data and IT systems
High costs
Values
Reduce Costs
Ensure Security and Business Continuity
SSH.COM CryptoAuditor
Intelligent 3rd party session control and forensics used by Fortune 500 companies.
About Product
Description
Trust is essential. As we collaborate more from person-to-person, organization-to-organization and machine-to-machine, we must trust colleagues, partners and suppliers with access to our precious networks.
You grant access to a staggering number of 3rd parties via encrypted connections. DevOps, M2M and connections to the IoT mean that 3rd party access is exploding. The cost of ad hoc management and troubleshooting of 3rd party access is extraordinary.
As well as a cost factor, there is a security risk and compliance problem.
Network and data security products do not read, control or investigate who is or was doing what in encrypted sessions. You have no knowledge of events on an individual session-level.
Major organizations need security designed for totally compliant and secure session control. SSH.COM’s Fortune 500 customers rely on our intelligent, real-time, granular session control and forensics.
SSH.COM CryptoAuditor is a centrally managed virtual appliance for monitoring, controlling and auditing encrypted privileged access and data transfers. It’s designed for deployment in front of server farms, databases and network entry points to solve the problem of poorly monitored privileged access, particularly remote vendor access.
It terminates and re-opens privileged user sessions, and inspects and records sessions in real-time before re-encrypting and pushing the session forward. Sessions are indexed and stored in an encrypted database for reporting, replay and forensic investigation.
It’s easy to run from the centralized console, and easy to deploy, with no hardware, no agents, no new clients, no user training, and no changes to workflows. It can be deployed in a fully transparent mode with no changes to end-user access and login procedures.
SSH.COM CrypoAuditor is cloud-ready, integrates with all major DLP, AV, IDS and SIEM systems, and is used by four of the world’s five largest banks.
SSH.COM CryptoAuditor is an intelligent proxy designed for deployment in front of server farms, databases and network entry points.
- Monitor insider and 3rd party access to your digital core
- Control remote access by vendors, consultants, home workers, and M2M and IoT connections
- Define privileged access and activities based on user identity
- Collect forensic evidence for investigations with every keystroke and every pixel
- Protect critical data and minimize credentials abuse by enabling two-factor authentication
- Integrate with existing firewalls, detect attacks earlier and resolve issues in real-time
- Address individual accountability even for shared accounts with AD/LDAP infrastructure
- View encrypted SSH, SFTP and Remote Desktop traffic at your boundary
- Prevent data theft with Data Loss Prevention (DLP) and analytics
- Record, store and index session audit trails for searches, replay and reporting, with support for 4-eyes review
Competitive products
User features
Roles of Interested Employees
Chief Executive Officer
Chief Information Officer
Chief IT Security Officer
IT Security and Risk Management
Organizational Features
IT Security Department in company