Your browser does not allow storing cookies. We recommend enabling them.

Government Case Study


A federal government law enforcement agency had outsourced IT operations to maximize the flexibility and reduce costs. This presented concerns as third party contractors were now responsible for troubleshooting sensitive systems and applications.

This resulted in the agency’s internal environment becoming extremely complicated. Most traffic was protected by encryption protocols, for instance, Remote Desktop and SSH. The federal agency had no visibility or control into what privileged users were doing within the network. There was an immediate need to provide sufficient control and to be able to monitor processes for encrypted privileged connections.


SSH Communications Security partnered with the law enforcement agency to address the need for governance and securing privileged access with CryptoAuditor®. It is a transparent, network-based solution for monitoring encrypted connections at a designated network entry point.

CryptoAuditor® provided support for network level authentication, a secure authentication method commonly used in establishing a remote desktop connection that helps protect the remote computer from malicious users and software.

With CryptoAuditor®, the customer was able to re-gain real-time visibility, and further implement better privileged access management measures throughout all of there their sensitive systems and applications.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more