View
Sorting
From A to Z
Products found: 1
SSH.COM CryptoAuditor
Trust is essential. As we collaborate more from person-to-person, organization-to-organization and machine-to-machine, we must trust colleagues, partners and suppliers with access to our precious networks.
You grant access to a staggering number of 3rd parties via encrypted connections. DevOps, M2M and connections to the IoT mean that 3rd party access is exploding. The cost of ad hoc management and troubleshooting of 3rd party access is extraordinary.
As well as a cost factor, there is a security risk and compliance problem.
Network and data security products do not read, control or investigate who is or was doing what in encrypted sessions. You have no knowledge of events on an individual session-level.
Major organizations need security designed for totally compliant and secure session control. SSH.COM’s Fortune 500 customers rely on our intelligent, real-time, granular session control and forensics.
SSH.COM CryptoAuditor is a centrally managed virtual appliance for monitoring, controlling and auditing encrypted privileged access and data transfers. It’s designed for deployment in front of server farms, databases and network entry points to solve the problem of poorly monitored privileged access, particularly remote vendor access.
It terminates and re-opens privileged user sessions, and inspects and records sessions in real-time before re-encrypting and pushing the session forward. Sessions are indexed and stored in an encrypted database for reporting, replay and forensic investigation.
It’s easy to run from the centralized console, and easy to deploy, with no hardware, no agents, no new clients, no user training, and no changes to workflows. It can be deployed in a fully transparent mode with no changes to end-user access and login procedures.
SSH.COM CrypoAuditor is cloud-ready, integrates with all major DLP, AV, IDS and SIEM systems, and is used by four of the world’s five largest banks.
SSH.COM CryptoAuditor is an intelligent proxy designed for deployment in front of server farms, databases and network entry points.
- Monitor insider and 3rd party access to your digital core
- Control remote access by vendors, consultants, home workers, and M2M and IoT connections
- Define privileged access and activities based on user identity
- Collect forensic evidence for investigations with every keystroke and every pixel
- Protect critical data and minimize credentials abuse by enabling two-factor authentication
- Integrate with existing firewalls, detect attacks earlier and resolve issues in real-time
- Address individual accountability even for shared accounts with AD/LDAP infrastructure
- View encrypted SSH, SFTP and Remote Desktop traffic at your boundary
- Prevent data theft with Data Loss Prevention (DLP) and analytics
- Record, store and index session audit trails for searches, replay and reporting, with support for 4-eyes review
-
-
ROI-
-
11
18
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.