Skip to content

Global microchip manufacturer secures 1 million machine connections 

Puts SSH keys under governance and deploys keyless M2M connections at scale.

Privileged access management made easy for MSPs

Customer

  • A global manufacturer with headquarters in Europe

  • 10B € turnover

  • Around 50k employees

  • +6500 servers 

Powerful quantum-safe security solutions

Customer challenge: Legacy PAM performance for machine connections

The customer had three main drivers for this project:

Their incumbent PAM solution did not address SSH connections used for SFTP transfers, orchestration engines, and application batch jobs. 

They wanted to reduce the operational overhead of ensuring SSH key-based access was well and efficiently controlled.

They needed to ensure that SSH key-based access did not bypass their existing PAM deployment.

Solution: Migrating to keyless SSH connections to enable 1M connections per day

Our PrivX Zero Trust Suite solution was deployed as a complementary technology to their existing PAM solution, Unlike the legacy PAM our solution provide full visibility of all SSH keys in use for the use cases mentioned above and also a path to migrate away from SSH key based authentications.

This improves the operational efficiency of IT operations and security access management teams and improves the overall security posture by moving away from static permanent credentials  that are providing unnecessary access.

We now manage over 1,000,000 automated SSH connections per day for their environment and we've removed SSH key based access.

Benefits

scale-balanced
Keyless and auto-scaling

No need for resource-intensive processes, like vaulting, rotating or managing SSH keys. This gives a massive performance boost for automated connections.

High Speed
1 million connections per day

The immutable, ephemeral access -based  environment allows the performance of up to a million automated connections per day..

Certification
Compliant

SSH keys are audited, tracked and have an expiry date, making their use secure and compliant.

Hourglass
Zero Standing privileges

No permanent access or connection, permanent authorizations or permanent credentials in the critical environment.

gear-cycle
Audited M2M connections

M2M connections are identified, tracked and audited, just like interactive ones, and their secrets are secured.

hall
Proper governance

SSH keys, passwords, privileged users and automated connections are all under proper governance for compliance.

Learn more about securing access using ultra-modern PAM.