Global Microschip Manufacturer Secures 1 Million Machine Connections
A Marine Vessel Operator Secures Remote Access for Diagnostics, Maintenance and IoT Data Collection
Customer
- A global manufacturer with headquarters in Europe
- 10B € turnover
- Around 50k employees
- +6500 servers
Challenge - Legacy PAM Performance for Machine Connections
The customer had three main drivers for this project:
1) Their incumbent PAM solution did not address SSH connections used for SFTP transfers, orchestration engines, and application batch jobs.
2) They wanted to reduce the operational overhead of ensuring SSH key based access was well and efficiently controlled.
3) They needed to ensure that SSH key based access did not bypass their existing PAM deployment.
Solution - Migrating to keyless SSH connections to enable 1M connections per day
Our PrivX Zero Trust Suite solution was deployed as a complementary technology to their existing PAM solution, Unlike the legacy PAM our solution provide full visibility of all SSH keys in use for the use cases mentioned above and also a path to migrate away from SSH key based authentications.
This improves the operational efficiency of IT operations and security access management teams and improves the overall security posture by moving away from static permanent credentials that are providing unnecessary access.
We now manage over 1,000,000 automated SSH connections per day for their environment and we've removed SSH key based access.
Benefits
Keyless and auto-scaling
No need for resource-intensive processes, like vaulting, rotating or managing SSH keys. This gives a massive performance boost for automated connections.
1 million connections per day
The immutable, ephemeral access -based environment allows the performance of up to a million automated connections per day.
Compliant
SSH keys are audited, tracked and have an expiry date, making their use secure and compliant.
Audited M2M connections
M2M connections are identifed, tracked and audited, just like interactive ones, and their secrets are secured.
Zero Standing privileges
No permanent access or connection, permanent authorizations or permanent credentials in the critical environment.
Proper governance
SSH keys, passwords, privileged users and automated connections are all under proper governance for compliance.
See the solution in action - book a demo!
Experience the functionality of PrivX and see the future of secure access control
Thank you for submitting your request. We'll get in touch with as soon as possible to arrange a time that suits you.