SSH

SSH keys are ubiquitous, yet many companies forget to treat them as identities with credentials. SSH, the inventors of the SSH protocol, offers solutions for organizations ready to confront this “silent killer” of security awareness.


CryptoAuditor

  • Capture, Control, Monitoring and Recording of SSH/RDP sessions

  • RADIUS bind for MFA enablement

  • ICAP integration for DLP, AV, IDS scrubbing of session data / attachments.

  • Log export to SIEM

  • Manage sub-channels (scp, sftp, etc… including directional control)

  • Simple, fast time to deployment

Universal SSH Key Manager:

  • Founded the SSH Key Lifecycle Management market

  • Centralized / automated SSH policy enforcement

  • No vaulting of keys

  • Agentless, Agent or Script-based scanning & management

  • NFS management of keys

  • Linux, Unix, Mainframe, Windows support

PrivX:

  • On-demand SSH/RDP access for on prem and cloud environments

  • Ephemeral credentials – no keys to manage

  • Time-based access control

  • AD/LDAP integration for management of groups v users

  • Record / playback of all user activity

  • HTTPS control for browser based device (router, switch, etc) access

  • Microservices architecture for fast deployment and growth flexibility

 
Andrew Budlong