Your browser does not allow storing cookies. We recommend enabling them.

Government Case Study

Challenge

A federal government law enforcement agency had outsourced IT operations to maximize the flexibility and reduce costs. This presented concerns as third party contractors were now responsible for troubleshooting sensitive systems and applications.

This resulted in the agency’s internal environment becoming extremely complicated. Most traffic was protected by encryption protocols, for instance, Remote Desktop and SSH. The federal agency had no visibility or control into what privileged users were doing within the network. There was an immediate need to provide sufficient control and to be able to monitor processes for encrypted privileged connections.

Solution

SSH Communications Security partnered with the law enforcement agency to address the need for governance and securing privileged access with CryptoAuditor®. It is a transparent, network-based solution for monitoring encrypted connections at a designated network entry point.

CryptoAuditor® provided support for network level authentication, a secure authentication method commonly used in establishing a remote desktop connection that helps protect the remote computer from malicious users and software.

With CryptoAuditor®, the customer was able to re-gain real-time visibility, and further implement better privileged access management measures throughout all of there their sensitive systems and applications.


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now