Request demo
PrivX Insights

Know your cryptographic risk 

Catalog your crypto inventory determine the risks they present to your business. 

Contact us 

Risk_Assessment_picture_03

PrivX Insights 

Our Risk Assessment is now PrivX Insights with new enhancements so now you can easily:

  1. Get insights into your classical cryptography and your level of post-quantum cryptography (PQC) readiness

  2. Identify vulnerabilities and discover rogue, high-risk connections that violate policies and regulations by mapping algorithms

  3. Pass Audits and ensure compliance with custom recommendations and detailed reports

What's included? Contact us

network_abstract2

Customized Report

  • Audit of your SSH key environment: a comprehensive overview of your current situation (servers, authorizations, keys, policies)
  • Inventory of all active (or potentially active) SSH keys 
  • SSH key health analysis, including key algorithms, length, and age
  • SSH key compliance analysis, including NIST, SOX, HIPAA, PCI-DSS, and SANS CIS rules
  • Root accounts analysis, e. g. privileged account violations
  • Non-production to production analysis, e. g. non-prod to prod authorizations, non-prod to prod access violations
  • Recommendations to solve and/or remediate your uncovered situation

    Learn how major corporations mitigate their SSH risks >

    Contact us

Key Features 

Feature PrivX Insights
Discovery and analysis of SSH user keys
Discovery and analysis of SSH host keys
Discovery of SSH1 keys
SSH key trust relationship map
Reporting on SSH key algorithms, size and age
Reporting on orphan keys
Reporting on the usage of weak cryptographic algorithms
SSH server hardening (reporting on common security pitfalls: SSHv1, password authentication for root accounts, TCP tunneling, agent and X11 forwarding, etc.)
Reporting on the usage of deprecated ciphers, MACs and KEX algorithms
Access from non-production to production
Reporting on SSH key parameters
SSH key policy recommendations
SSH key security recommendations
PAM/jump host bypass
Reporting on unused SSH key granting access
Analysis of keys under root and other high-privilege, high-risk user accounts
Reporting on keys granting access to forbidden locations
Reporting on transitive trusts including privilege elevation through pivoting

Talk to our experts about our non-invasive PrivX Insights service for complex SSH environments

Thanks for submitting the form.