Universal SSH Key Manager®

The vast majority of large enterprises rely on Secure Shell (SSH) to provide secure authentication and confidentiality (encryption) for many business-critical functions such as automated backups, day-to-day file transfers, and interactive systems administrator access.

Many mission-critical IT functions are enabled through SSH. SSH utilizes SSH keys for identity and access control. There are more SSH keys than there are any other credentials in a typical corporate network. These keys secure and control the access to critical corporate resources. Each SSH key has powers that are very similar to a password, and they must be managed with similar care and attention.

Universal SSH Key Manager discovers, monitors, remediates, and manages SSH keys for interactive and automated connections in on-premise and cloud-based environments. It implements the full life cycle management for keys, integrated with identity and access management systems.

Reduce Risk - Enable Compliance

Universal SSH Key Manager reduces risk of serious deep-level information security breaches. It brings the corporate trusted access into compliance with regulatory mandates such as Sarbanes-Oxley, PCI-DSS, and HIPAA.

Universal SSH Key Manager provides enterprises a comprehensive oversight and control over SSH access, cryptographic best practices, and configuration management. SSH key management is an essential part of the identity and access management policy of any enterprise.

Universal SSH Key Manager is non-intrusive — all operations for discovery, continuous monitoring, access lockdown, remediation, and key life cycle management are conducted without disrupting existing workflows and business processes.

SSH Communications Security has gathered extensive experience in enterprise-wide SSH key management deployments. Based on these experiences we have defined best practices to resolve the issues of SSH access control in high-security environments.

Assess, Discover, Monitor, Remediate, Manage

We take a project driven approach to bringing an SSH environment under management control. Our approach is non-intrusive and enables a zero-disturbance deployment to production and corporate processes. We are the original inventors of SSH, and we lead the market in SSH key management - our experience and know-how guarantee successful deployments of access control for your critical infrastructure.

Stages of an SSH Key Management Project

Features

Non-intrusive deployment - Agentless, agent, and hybrid deployment models for easy and quick discovery

Scalable architecture to meet the needs of the challenging on-premise and cloud environments

Comprehensive platform support across Windows, Unix, Linux, and z/OS Mainframes.

Support for multiple variants of SSH including OpenSSH, Tectia SSH, Centrify, Quest, Attachmate, Bitvise

Policy-based controls for ease of visibility, provisioning, de-provisioning, remediation, and full key lifecycle automation

Centralized configuration management for access lockdown and control

REST API for ease of integration into your existing identity access management infrastructure

User portal for application owner identity management enablement and simple 3rd party access provisioning

Benefits

Achieve compliance to regulatory requirements (such as Sarbanes-Oxley, PCI-DSS, HIPAA Security Rule, and others). Assured compliance means painless and smooth audits.

Reduce risk of security breaches. Unmanaged SSH keys expose organizations to deep-level security breaches that are difficult to detect and may have grave consequences.

Reduce cost by centralizing and automating work-intensive and error-prone IT maintenance tasks such as SSH key rotation and lifecycle management.

Universal SSH Key Manager Architecture

Further Reading

Gain visibility into the state of your network with SSH Risk Assessment.

Read the IDC whitepaper on SSH and IAM - The gaping hole in IAM.

Download the Datasheet: Universal SSH Key Manager Data Sheet 2.0 (Letter) or Universal SSH Key Manager Data Sheet 2.0 (A4)

Read more on SSH keys and compliance.

Live Online Demonstration

Contact SSH Sales

RECOMMENDED FOR YOU
RECOMMENDED FOR YOU
RECOMMENDED FOR YOU
RECOMMENDED FOR YOU
RECOMMENDED FOR YOU
RECOMMENDED FOR YOU