Quick navigation

SSH Communications Security

CryptoAuditor from SSH Communications Security

Virtual appliance for monitoring, auditing and controlling encrypted privileged access and data transfers
Value Proposition

Problem

Privileged users need access to critical systems, devices and data to do their jobs. Their activities are secured by protocols such as Secure Shell (SSH), Remote Desktop Protocol (RDP) and Secure Socket Layer (SSL). Shared accounts and encrypted communications make it difficult to know which privileged user is doing what, where and when, especially in today’s virtual office environment and outsourced IT administration set-ups. There has to be accountability and true visibility, while enabling efficient working practices. Every session and command must be traced to an individual and individuals should not have more access than they need to do their jobs. Finally, malicious activity must be stopped in real time. Lack of accountability, control and real-time response expose your organization to costly data breach, denial of service and compliance failures

Solution

CryptoAuditor is a centrally managed virtual appliance for monitoring, auditing and controlling encrypted privileged access and data transfers. CryptoAuditor is a network-based, inline traffic monitor that decrypts and records the activities of privileged users without interfering with their normal workflow. There are no agents to deploy; it works regardless of what devices users connect with and what they connect to. CryptoAuditor is more than a passive monitor; it provides identity-based policy controls that specify where privileged users can go in your network and what they can do. CryptoAuditor also integrates with your DLP, IDS and SIEM systems, enabling real-time detection and prevention of data loss

Features

  • Accountability: You know exactly who the users are and what they did
  • Privileged access on a “need to know, need to do” basis
  • Audit: An indexed database of privileged sessions including video replay of graphical sessions
  • Real-time defense: Your SIEM, DLP and IDS gain real time visibility into encrypted sessions
  • Easy deployment: Transparency and distributed architecture enable efficient, low-cost deployment
Supporting Technology
  • Multiple deployment modes: Bridge, Router, Bastion
  • Encrypted storage with audit zones to secure audited activity from unauthorized access
  • Monitors and records SSH, SFTP, RDP, SSL/TLS, HTTPS
  • HTTP REST API for requesting connection authorization from third-party solutions provides an extra security layer for accessing critical servers
  • Identity-based policy control with integration to directory services
  • Distributed architecture with multiple freely-distributable Hound audit-points, and shared Vault storage
Standards & Compliance
  • GDPR
  • HIPAA
  • ISO27000
  • SOX
Customers
Downloads

Video(s)