Privileged users need access to critical systems, devices and data to do their jobs. Their activities are secured by protocols such as Secure Shell (SSH), Remote Desktop Protocol (RDP) and Secure Socket Layer (SSL). Shared accounts and encrypted communications make it difficult to know which privileged user is doing what, where and when, especially in today’s virtual office environment and outsourced IT administration set-ups. There has to be accountability and true visibility, while enabling efficient working practices. Every session and command must be traced to an individual and individuals should not have more access than they need to do their jobs. Finally, malicious activity must be stopped in real time. Lack of accountability, control and real-time response expose your organization to costly data breach, denial of service and compliance failures
CryptoAuditor is a centrally managed virtual appliance for monitoring, auditing and controlling encrypted privileged access and data transfers. CryptoAuditor is a network-based, inline traffic monitor that decrypts and records the activities of privileged users without interfering with their normal workflow. There are no agents to deploy; it works regardless of what devices users connect with and what they connect to. CryptoAuditor is more than a passive monitor; it provides identity-based policy controls that specify where privileged users can go in your network and what they can do. CryptoAuditor also integrates with your DLP, IDS and SIEM systems, enabling real-time detection and prevention of data loss