010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova StyleVision Server Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus Nevron Vision for .NET OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Altova StyleVision Sencha Test Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SPC Control Chart Tools for .Net SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

BALABIT Privileged Session Management

Privileged Session Management

 

Overview

Privileged Session Management

Balabit’s Privileged Session Management, Shell Control Box (SCB), controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise device, completely independent from clients and servers - integrating seamlessly into existing networks. It captures the activity data necessary for user profiling and enables full user session drill down for forensic investigations.

 

FASTEST RETURN TO VALUE

SCB is a host-independent and turnkey network appliance - its implementation is fast and simple. You can have a fully operational session management solution within a week. As a transparent solution, it requires minimal change to your network. Users do not have to change their client applications or workflow.

 

Central policy enforcement

The SCB acts as a centralized authentication and access-control point in your IT environment which protects against privileged identity theft and malicious insiders. The granular access management helps you to control who can access what and when on your critical IT assets.

Prevention of malicious activities

SCB monitors privileged user sessions in real-time and detects policy violations as they occur. In case of detecting a suspicious user activity (for example entering a destructive command, such as the "rm"), SCB can send you an alert or immediately terminate the connection.

 

Greater accountability

SCB audits "who did what", for example on your database or SAP servers. Aware of this, your employees will do their work with a greater sense of responsibility leading to a reduction in human errors. By having an easily interpreted, tamper-proof record, finger-pointing issues can be eliminated.

 

Faster, cost-effective compliance audits

SCB makes all user activity traceable by recording them in high quality, tamper-proof and easily searchable audit trails. The movie-like audit trails ensure that all the necessary information is accessible for ad-hoc analyses or audit reports.

 

Lower troubleshooting & forensics costs

When something wrong happens, everybody wants to know the real story. Analyzing thousands of text-based logs can be a nightmare and may require the participation of external experts. The ability to easily reconstruct user sessions allows you to shorten investigation time and avoid unexpected cost.

Features

Technology leading privileged session management

 

“Compare mixed offerings from multiple vendors against comprehensive suites. Adding third party capabilities such as privileged session management (PSM) can sometimes offer a more suitable solution at a lower price than a suite offering."

--- Gartner, Market Guide for Privileged Access Management, Felix Gaehtgens, Anmol Singh, 27 May 2015

 

Granular Access Control

SCB acts as an application level proxy gateway. The transferred connections and traffic are inspected on the application level (Layer 7 in the OSI model), rejecting all traffic violating the protocol – an effective shield against attacks. This high-level understanding of the traffic gives control over the various features of the protocols, like authentication and encryption methods used in SSH connections, or channels permitted in RDP traffic.

 

Support for SSH, RDP, HTTP(s), Citrix ICA, Telnet, TN3270/TN5250, VNC, X11 and VMware View protocols

 

Control protocol specific channels, such as terminal sessions, disk-mapping or file sharing

 

Audit SCP, SFTP and HTTP(s) based file transfers

 

Detailed access control based on time and user group policies

Strong Authentication and Authorization

SCB can enforce the use of two-factor authentication methods and also verify the public key of the users. SCB has a built-in capability to verify the SSH host keys and certificates identifying the servers, preventing man-in-the-middle attacks and other threats. This authentication is completely independent from the authentication that the user performs on the remote server. To avoid accidental misconfiguration and other human errors, SCB supports the 4-eyes authorization principle as well.

 

Gateway authentication

 

Integration with authentication databases (for example, Microsoft AD, LDAP or RADIUS) and multifactor authentication backends

 

User-mapping policies – describe who can use a shared user (e.g. "root") to access the remote server

 

Password vaulting – use the built-in Credential Store, or integrate with a third-party password management system

 

Server-side auto-login with SCB impersonating the authenticated user on the server

 

"4 eyes" authorization – the authorizer can allow, track, and even terminate the administrator’s access to the server

High Quality session recording

SCB operates transparently and extracts information directly from the communication of the client and the server, providing reliable access data. SCB records user sessions into searchable audit trails, making it easy to find relevant information in forensics or troubleshooting situations. Audit trails can be browsed online, or followed real-time to monitor the activities of the privileged users. The multiplatform Audit Player application replays the recorded sessions just like a movie – all actions of the administrators can be seen exactly as they appeared on their monitors. The Audit Player enables fast forwarding during replays, searching for events (for example, mouse clicks, pressing Enter) and text seen by the user.

 

Complete documentation about ALL remote system access

 

Tamper-proof (encrypted, signed and time-stamped) audit trails

 

Movie-like playback of recorded sessions

 

Fast, free-text search in sessions

 

Custom activity and compliance reports

 

Real-time Alerting and Blocking

SCB can monitor traffic in real time, and execute various actions if a certain, predefined pattern appears in the command line or on the screen. In the case of detecting a suspicious user action (e.g. a destructive command or an unwanted windows application), SCB can perform the following measures:

Send an e-mail or SNMP alerts about the event

 

Immediately terminate the connection

 

Log the event in the system logs

 

Store the event in the connection database of SCB

 

Easy-to-use GUI

SCB is configured from a clean, intuitive web interface. The roles of each SCB administrator can be clearly defined using a set of privileges – management of SCB as a host, management of connections to servers, viewing audit trails and reports, and so on.

 

Granular access control to SCB GUI

Ergonomic, web-based search interface

 

seamless Integration into security ecosystem

To ensure integration into your network infrastructure is seamless, SCB is available both as a physical or virtual appliance and automatically handles transparent and nontransparent connections. It can be seamlessly integrated with password management, ticketing systems, SIEM and system management tools. To simplify integration with firewalled environments, SCB supports both source and destination address translation (SNAT and DNAT).

 

Independent network appliance, agentless design

 

Flexible network configuration incl. virtual LAN support

 

Fast deployment (3-5 days) and low OPEX

High Availability option

 

Robust hardware configurations

 

VMware & MS Hyper-V virtual appliance option

 

Deployment in Microsoft Azure cloud

Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved