SSH Communications Security - Privilege Management

Company Description

SSH Communications Security is the market leader in developing advanced security solutions that enable, monitor and manage encrypted networks. As the inventor and original developer of the Secure Shell protocol, they possess the highest level of knowledge and understanding with regards to the protocol.

Throughout history, they have developed leading edge security solutions that enable organizations to protect against a rapidly growing threat landscape that includes both internal and external actors. Their platform based approach to Secure Shell deployment and management provides the only solution on the market that addresses the need for security, compliance and operational efficiency in today’s complex enterprise environments.


 

Products Overview

 

The three products developed by SSH Communications Security are Tectia SSH, CryptoAuditor and Universal SSH Key Manager. The table below provides a brief overview of the products:

 

 

Benefits:
  • Agentless, immune from host based malware
  • Real-time monitoring of privileged user activities in encrypted traffic
  • Transparent and non-intrusive to users and applications
  • Session recording, search and replay
  • Rapid, straight forward deployment - distributed solution 
  • Audit encrypted traffic on a need-to-know basis

     

    More detailed information with regards to each product is in the following sections.

     

    Video: Insider Attacks in Secure Shell Environments

     


     

    Product Description

     

    Tectia SSH is a unified client/server platform which is utilised to simplify secure shell environments. It is used by various organisations globally in order to secure various IT processes such as automated file transfers & remote systems administration. The features, reliability and manageability of the Tectia SSH platform provide users with the assurance that their processes are well protected.

     

    Some Features & Benefits:
    • Wide range of support - IBM z/OS, Mainframes, OpenSSH and standard SSHv2-compliant third-party implementations etc
    • Secure file transfer - Protect various sensitive information such as business secrets during travel
    • Easy of use - Not need to worry about complicated details and issues with regards to the platform
    • High level of security - Compliant with IETF Secure Shell standards

     

     

    Video: Solving Customer Challenges with Tectia ConnectSecure

     

    Product Description

     

    CryptoAuditor is a network-based virtual appliance which is centrally managed. It provides users with the capabilities to monitor, record, control and enable encrypted administrator sessions, third party access, and file transfers. In doing so, the user can control encrypted privileged access and data transfer in order to lower security risk and increase resiliency.

     

    Some Features & Benefits:
    • Monitor - Ability to see who the privileged users are, and what they are doing, even if it is encrypted (SSH, SFTP, RDP, SSL/TLS, HTTPS)
    • Record - Stores all of the session information in an encrypted database, and provides functionalities like searching and playback
    • Control - Control which users can access which servers, what activities they can perform and what services they can use
    • Enable - Visibility into encrypted content allow SIEM, IPS and DLP to stop malicious activity on the fly

     

     

    Video: SSH CryptoAuditor Demo

     

    Product Description

     

    Universal SSH Key Manager provides better management over SSH public and private keys, which may be untracked due to various activities which require encryption such as automated backups and day-to-day file transfers. It equips the user with visibility of SSH keys through a scalable, multi-platform solution which does not disrupt disrupting existing workflows and business

     

    Some Features & Benefits:
    • Multi-platform support - Unix, Linux, Windows, IBM z/OS, as well as VMWare ESX 5.5 and other hypervisors
    • High level of automation - Lower cost, faster turnaround, better management of the systems and policies
    • Compliance support - Enables compliance to current requirements and planned updates to PCI, NIST/FISMA, SOX, HIPAA, Basel III mandates
    • Logging - Provides comprehensive trails and alerts for suspicious activities like unauthorised changes to configurations

     

     

    Video: The Myth of SSH Key Discovery (Part 1 of 4)

     

     
     

     

Copyright 2016 Ace Pacific Pte Ltd All rights reserved . Site by SGIHUB.