Your browser does not allow storing cookies. We recommend enabling them.

SSH CASB (Cloud Access Security Broker) Partner Program

“By 2020, 85% of large enterprises will use a cloud access security broker product for their cloud services, which is up from fewer than 5% today.” -Gartner, October 22, 2015

To meet this exploding demand, Cloud Access Security Brokers (CASBs) need to monitor privileged user activity in encrypted networks. SSH Communications Security has the answer with CryptoAuditor:

  • CryptoAuditor is a network–based virtual appliance that monitors, controls, and audits encrypted administrator sessions, 3rd party access, and file transfers.
  • Optimal for elastic cloud and virtualized environments, CryptoAuditor can inspect both interactive and application to application based access, detect anomalies, and respond to threats in real–time.
  • CryptoAuditor requires no changes to your environment. No agents to install and no access portal to go through. CryptoAuditor is often an extension of your firewall — fast to implement and has no impact on end user experience or workflows. It can also add a second factor of authentication without installing agents on hosts.
  • CryptoAuditor integrates readily with data loss prevention (DLP), intrusion detection (IPS), anti–virus (AV), and SIEM solutions and allows real-time incident detection and response to threats within encrypted sessions (SSH, SFTP, RDP or HTTPS).
  • CryptoAuditor fits nicely into DevOps processes to audit developer access into production for deployments and debugging.

For more information and a free trial, email or call 781-247-2100. You can also request additional information by filling the form below.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now