CryptoAuditor: Privileged user access auditing
Posted on 26 July 2012.
SSH Communications Security launched CryptoAuditor at the Black Hat USA 2012 conference. It helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with inline, real-time and transparent audit capabilities for financial service providers, retailers and other enterprises transmitting sensitive information.


The Universal SSH Key Manager module and the CryptoAuditor module integrate smoothly into existing enterprise security solutions including DLP and SIEM providing deeper audit and forensics capabilities into encrypted traffic.

Both modules employ sophisticated key management capabilities, including group-based access controls and automatic key discovery, deployment and removal. This link between the two modules allows for fully transparent inline deployments, providing strong security, minimal system latency, operating cost reduction and the ability to deploy a single-sign-on effect throughout the entire enterprise.

CryptoAuditor key facts:
  • Inline deployment capabilities eliminate costly and time-consuming workarounds and processes required by first-generation solutions
  • Reduces the risk from advanced external threats by controlling and monitoring information as it moves across the environment, preventing data loss with an internal policy engine and DLP/SIEM integration capabilities
  • Delivers immediate control and accountability over privileged access users, closing significant security gaps in information security architecture
  • A minimally invasive approach that captures a broad array of traffic across all needed audit points while remaining transparent to administrators
  • Designed to easily deploy across distributed architecture, making management easy through a one-console approach.





Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //