不动明王是什么属相的本命佛| 血管瘪是什么原因| 猴年马月是什么时候| 乙肝抗体是什么意思| 茼蒿和什么相克| 断掌有什么说法| 生男生女取决于什么| 仲夏夜是什么时候| ubc是什么意思| 千里共婵娟什么意思| 玻尿酸是干什么用的| 头孢治什么| 50岁眼睛模糊吃什么好| 小狗吐白沫不吃东西没精神吃什么药| 舌头有红点是什么原因| 葫芦是什么意思| 亚硝酸盐是什么| 甸是什么意思| 星字属于五行属什么| 职业资格证书有什么用| 胃病吃什么食物养胃| 甲亢和甲状腺有什么区别| 头热是什么原因| 金屋藏娇定富贵是什么生肖| 什么油炒菜好吃又健康| 小孩吃什么提高免疫力| 老是掉头发什么原因| 多囊卵巢综合症是什么原因造成的| 生不逢时是什么意思| 冉是什么意思| 沉默寡言是什么意思| 虾米是什么意思| 减肥为什么不让吃茄子| 隔桌不买单是什么意思| 梦见走错路是什么意思| 静水流深什么意思| 樟脑是什么东西| 喝温开水有什么好处| 心理卫生科看什么病的| 李子什么季节成熟| 女人下面水多是什么原因| 什么水果补钙| 拉肚子是什么原因| 昭字五行属什么| 什么是假性自闭症| 什么书最香| 马刺是什么| 属猪的是什么命| 牛膝有什么功效| 指甲弯曲是什么原因| 冷暖自知的前一句是什么| 乳房痛挂什么科| 小肠火吃什么药效果快| 睡着了放屁是什么原因| 核医学科主要治什么病| 为什么冬天容易长胖| 体细胞是什么意思| 开柙出虎是什么意思| 防晒衣什么颜色最好| 属蛇男和什么属相最配| 甲钴胺片治疗什么病| 男生喜欢什么| 念字五行属什么| 来月经喝什么好| 孩子咬手指甲是什么原因| 哪吒是什么意思| 卡路里什么意思| 胃强脾弱吃什么中成药| 父母宫代表什么| 为什么尿是黄的| 狂风暴雨是什么生肖| 精索炎吃什么药最好| 豆角是什么| 香云纱是什么面料| 杜仲泡酒有什么功效| 诺五行属什么| 泡脚用什么泡最好| 心率低于60说明什么| 择日是什么意思| 尿液是什么味道| 净值是什么| 窦性心动过缓是什么意思| 与虎谋皮什么意思| 核糖体是什么| 夏天喝什么好| 2015属什么| 梦见吐血是什么预兆| 二尖瓣少量反流是什么意思| 13楼五行属什么| 陇是什么意思| 梦到自己头发白了是什么意思| 长期失眠应该吃什么药| 卫校学什么专业最好| 鹦鹉爱吃什么| 尿常规白细胞3个加号什么意思| 作恶多端是什么意思| 毛主席为什么不进故宫| 头晕耳鸣吃什么药| 赤潮是什么意思| 傀儡什么意思| 露营需要准备什么东西| 喝蒲公英根有什么好处| 所以我求求你别让我离开你是什么歌| 三月三十号是什么星座| 犯困是什么原因引起的| 智商100属于什么水平| vd是什么意思| 什么是双数| 养胃吃什么食物好| 淋巴肿瘤吃什么食物好| 八路军为什么叫八路军| 孕妇梦见棺材是什么征兆| 每晚都做梦是什么原因| p和t分别是什么意思| 脱发是什么原因| 北洋军阀是什么意思| 榴莲为什么贵| 黄褐色是什么颜色| 什么是脂肪肝| 手腕疼挂什么科| cm是什么| 月经十多天不干净是什么原因| 什么矿泉水最好| 瓜尔胶是什么东西| 九月是什么星座的| 容易水肿是什么原因| 王羲之的儿子叫什么名字| 张五行属什么| 荔枝代表什么寓意| 九月29号是什么星座| 坐月子可以喝什么饮料| 直肠炎是什么原因引起| 甲骨文是什么朝代的| 雪霁是什么意思| 黄瓜与什么相克| 什么牌子的冰箱好| 中规中矩是什么意思| 葡萄上的白霜是什么| 逆天是什么意思| 猎奇是什么意思| 唐筛是检查什么| 口苦是什么毛病| 05是什么生肖| 麻辣拌里面都有什么菜| 脾胃虚弱吃什么药| 吃什么降血脂最好| 未时是什么时候| 吃芒果不能吃什么| 特应性皮炎用什么药膏| 什么样的人招蚊子| 室性早搏吃什么药最好| 调兵遣将是什么生肖| 结甲可能是什么意思| 宝宝反复发烧是什么原因| 熬药用什么锅熬最好| 猫贫血吃什么补血最快| 子夜是指什么时间| rice什么意思| 软笔是什么| 女生打呼噜是什么原因| 散步有什么好处| 面瘫是什么原因引起的| 否是什么意思| 晚上起夜尿多吃什么药| 八岁属什么生肖| 消化性溃疡吃什么药好| 粉碎性骨折吃什么好| 肾出血是什么原因引起的| 女生下面什么味道| 俏皮话是什么意思| 日斤念什么字| 什么的云彩| 碗莲什么时候开花| 甲状腺结节吃什么中药| 孤僻的人给人什么感觉| 凝血是什么意思| 家里出现蚂蚁预示什么| 从头再来什么意思| 脚疼是什么原因引起的| 坐月子能吃什么水果| 保妇康栓治疗什么妇科病| 驾驶证b2能开什么车| 么么叽是什么意思| 喉咙发炎不能吃什么食物| 梦见打死蛇是什么意思| 和谐是什么| 为什么尿是红色的| 什么是超标电动车| mg是什么意思| 清蒸鱼一般用什么鱼| 辟谷是什么都不吃吗| 熊人是什么意思| 列文虎克发明了什么| 85年属什么的| 被蜜蜂蛰了用什么药| 舌吻是什么感觉| 秦皇岛有什么特色美食| 长期服用二甲双胍有什么副作用| 麦粒肿用什么眼药水| 餐中服用是什么意思| 二级产前超声检查是什么| 脑梗不能吃什么东西| cri是什么意思| 怀孕乳房会有什么变化| 腋下淋巴结肿大挂什么科| 奥斯卡小金人什么意思| 孕妇拉的屎是黑色的是因为什么| 什么东西养胃又治胃病| 惊厥是什么原因引起的| 音译是什么意思| 梦见红薯是什么意思| 211和985是什么意思| 肺栓塞有什么症状| 抗核抗体阳性是什么意思| 补阳气吃什么| 隐翅虫皮炎用什么药| 蒲公英有什么药效| kipling是什么牌子| 达摩是什么意思| 女人为什么会阳虚| 切诺为什么要饭前半小时吃| 历久弥新什么意思| 考护士资格证需要什么条件| 喝酒喝吐了用什么缓解| 摸头是什么意思| 吃什么保护眼睛| mj是什么单位| 耳后有痣代表什么| 嘴苦是什么原因引起的| 桑葚是什么季节的| 姐姐的孩子叫什么| 异食癖是什么意思| 夹页念什么| 刮痧用什么油刮最好| 请人原谅说什么| 吃什么壮阳| 经常手麻是什么原因引起的| 横纹肌溶解什么意思| 718什么星座| 湘女多情是什么意思| 楚楚欲动是什么意思| 木变石是什么| 糖粉是什么| 橡胶过敏是什么症状| 尿液有隐血是什么情况| 什么是鼻息肉| 本来无一物何处惹尘埃什么意思| 心脏窦性心律什么意思| 阴唇发黑是什么原因| 什么时候做人流才是最佳时间| 结膜炎用什么眼药水效果好| 木耳吃多了有什么坏处| 小腿肌肉痛什么原因| 外公的妈妈叫什么| 被口什么感觉| 梦见流鼻血是什么征兆| 聚字五行属什么| 体制外是什么意思| 眼尖什么意思| sin是什么边比什么边| 两班倒是什么意思| 9月份是什么季节| gary是什么意思| 32周做什么检查| 百度
Request demo
Why do customers choose our solutions?

印象是什么意思

百度   近年来,铁路的发展加速推动着春运的变迁。

Learn why customers all over the world trust our solutions and expertise in securing their mission-critical data and environments. 

PrivX case studies >>>

PrivX Key Manager case studies >>>

Tectia case studies >>>

Secure Collaboration case studies >>>

Zero Trust Privileged Access Management

PrivX Case studies

PrivX_Fortune500_CSwebpage

A Fortune 500 company secures access to container environments

Premise: The customer, a global Fortune 500 corporation, operates primarily in the cloud and offers services purely online. The company has a large container estate orchestrated with Kubernetes. Generally, the company’s environment is dynamic and complex with thousands of access connections to manage.

The customer was planning to expand their containers within the organization. However, they realized that while their container setup is a great fit, they lack in secure access management. Therefore, they started looking for a solution that would help to manage access in their agile, modern environment.

Challenge: The company had several requirements – primarily, they wanted to keep the changes to their environment to a minimum. They wanted to keep their Kubernetes orchestration in-house. So, the solution needed to support on-premises installations and offer highly dynamic and automated functions that are native to container solutions. Also, the customer wished to maintain their target information in the Forgerock Identity management system (IDM), so they can automate the transfer of user identity information between identity domains and IT systems.

Based on the requirements, the customer identified PAM solutions as the desired category, but they struggled to find a solution that would be mature and complex enough to support their needs.

Change: At last, the company came across the PrivX PAM solution. As PrivX is built on modern microservices architecture, it is possible to run the solution on Kubernetes. This further allows the customer to run their PAM at the same speed, scalability, and automation as they were used to previously. The microservice architecture of PrivX allows the customer to scale or update only the functions they currently need, instead of scaling or updating the entire instance hosting the function. This is particularly important in container environments which are extremely dynamic.

PrivX also works in line with the customer’s IDM requirement – it allows users to get access to the target based on their roles. Their IDs, roles, and target information are in sync. Additionally, PrivX is a passwordless and keyless solution which means that users don’t handle or see any credentials or keys.

Thanks to PrivX, the customer was able to save resources and regain control of their critical data. Additionally, they were provided with expert advice and technical support during planning and deployment.

Read more

PrivX_Quickdeployment_CSwebpage

Third-party risk mitigation in three days

Premise: The customer is one of the largest network providers throughout the entire Asia-Pacific region. They support residential as well as enterprise consumers with innovative telecom solutions that allow users to configure and manage their home wireless service from any device.

The customer approached one of their third-party integration partners to help them design, develop, manage, and maintain their wireless network solution. However, the partner needed secure access to the customer’s IT infrastructure and cloud platforms.

Challenge: The customer needed to grant secure access not just to the third-party partner, but also to other actors, like software developers, network operators, and customer operation teams. Without a PAM solution, all of them would log into the customer’s servers with simple user accounts and passwords. This direct access, via using passwords, would pose a serious security risk, as passwords can be easily shared and are hard to monitor.

Additionally, the organization had a tight development and implementation plan and needed a fast-to-implement solution.

Change: The involved partner recommended a solution that is, based on their own experience, secure, fast, and easy to manage – PrivX PAM solution by SSH.COM.

PrivX offers fast, one-click access into any IT environment. The solution also provides strong, secure access management. As SSH or RDP connections are established via one-use-only ephemeral certificates, no passwords are needed. Therefore, no passwords can be shared. Access to the servers can be secured even more through multifactor authentication, and additional monitoring can be done via PrivX’s auditing feature that provides audit logs, session tracking, and session recording.

Lastly, PrivX enables rapid deployment – it was up and running within the customer’s environment in just three days. It integrates with corporate directories (like Active Directory, LDAP, and OpenID) or with identity management software and stays in sync with any updates in the identities or their authorizations.

Read more

PrivX_Robots_CSwebpage

Secure access for robots to critical data

Premise: MOST Digital, a technology consultancy company, focuses on automating routine, workday tasks, like filing reports, updating documentation, or sending emails. They provide robotics-as-a-service (RaaS) solutions to more than 200 major companies.

To connect to customer environments, the company previously used VPN tunnels and jump hosts, but they found this system to be difficult to manage. So, they started looking for a simpler access management solution.

Challenge: MOST Digital needs to orchestrate secure access to customers’ systems not just for their staff and robots, but also for other third-party actors. Also, their customers might use cloud-based or hybrid environments or they have on-site infrastructure only. MOST Digital must make sure that their robots can connect to all these kinds of environments with access restricted only to internal customer systems. MOST Digital must ensure that the access is provided only to the required target systems.

At the same time, developers also need to interact with multiple cloud-based systems within owned and clients’ IT environments. Therefore, a crucial requirement for the new solution was that it needs to simplify and quicken the process. In addition, the developers handle sensitive customer data, so security and monitoring capabilities were high on the requirements list too.

Change: When MOST Digital came across the PrivX lean PAM solution, they wanted to test the solution first. The test proved to the company that PrivX provides exactly the simplicity, speed, and security they needed. Setting up the test environment itself took only four hours, and once the company decided to fully implement the solution, they were able to retrieve data they already used during the test.

Another feature of PrivX that was proven to be extremely useful is its auditing and monitoring feature. MOST Digital needs to demonstrate to their customers what they’ve done in their systems and with their data – this is exactly what PrivX’s audit logs and tracking provide.

Read more

PrivX_Governmentdepartment_CSwebpage

Streamlined access management & session monitoring

Premise: The customer is a department of the Hong Kong government with a large workforce and frequent access changes due to internal transfers, promotions, and new hires. They manage thousands of connections, access requests, and access changes coming from employees, third-party vendors, associates, and partners. To manage their access systems and comply with auditing requirements, the organization previously used two separate solutions for access management and session monitoring.

However, the system has proven to be costly, time-consuming, and unreliable. Therefore, the customer started looking for a lean PAM solution, which would also include monitoring, to replace their outdated password sharing system.

Challenge: The client required a solution that would allow simplified access management for employees as well as third-party actors. The solution also had to offer a way to streamline the access requests and approval workflow. Additionally, the customer was looking for a solution that would allow easy integration with their native tools (including Putty and RDP Client) to prevent end users from having to change their behavior.

Change: The PrivX solution allowed the customer to modernize and simplify their access management and improved their monitoring capabilities.

PrivX utilizes an agentless approach which helped the customer to decrease the time investment and costs needed to manage their access management system. The solution minimizes the amount of manual updating required and introduces a new way of defining access based on roles (compared to access for specific individuals). This way, frequent changes of personnel as well as access for third-party actors could be handled easily and securely.

Also, PrivX utilizes a password-less approach that allowed the customer to adopt a secure access management system based on ephemeral certificates. Rather than traditional passwords that need to be kept in a password vault, which involves expensive maintenance.

Lastly, the required session monitoring helps the organization to record access traffic, create full audit logs, and analyze user behavior in search for potential security issues. The monitoring feature also proved to be useful during the development of training materials for new hires.

Read more

PrivX_GlobalIoT_CSwebpage

Global IoT device provider ensures secure maintenance

Premise: The customer is a manufacturer of home appliances with a turnover of +10 billion euros, +50 thousand employees, +35 factories worldwide, and headquarters in Europe. The company’s portfolio includes more than 10 well-known appliance brands.

The customer has service and Quality Assurance (QA) staff all over the world and they need secure access to consumers’ devices, also located all over the globe. Therefore, the company was looking for a solution that would allow their staff secure access to the target devices.

Challenge: The QA staff was previously sharing a “golden key” that provides access to all target IoT devices. However, this approach is extremely risky as it offers no identification of the staff nor tracking of the usage of the key. Thus, the company wanted to increase their security and reduce risks connected to the sharing of the key, all while maintaining the flexibility and efficiency of using golden keys.

Change: At first, the customer wanted to solve the challenge in-house, but it turned out to be bigger than they anticipated. Then they came across our PrivX Privileged Access Management (PAM) solution.

With PrivX, the customer ensures that their QA staff is able to provide maintenance to the IoT devices as easily as before, but without handling, sharing, or seeing keys anymore. The company still uses golden keys, but only a few QA admins have access to the vault. So, the keys don’t need to be changed or rotated anymore.

Additionally, all sessions are identified and tracked, and the QA Engineers are assigned the right role for the task at hand at login. The golden key is safe from misuse, accidental misconfigurations, or ending up in the hands of bad actors looking to steal intellectual property.

Read more

PrivX_Tradingcompany_CSwebpage

Stock trading company passing audits after a swift PrivX Zero Trust deployment

Premise: The customer is a successful finance and stock trading company that offers their customers an intuitive online brokerage platform and specializes in East Asian trades. As the company operates in the financial sector, they are regularly subject to strict audits and security checks to ensure they follow regulations.

Challenge: The client previously used a traditional password sharing approach to manage access to their systems. A system administrator had to give users the login details and to prevent misusage of the credentials, they were regularly changed. This approach was time-consuming, resource-intensive, and not secure.

Additionally, monitoring of this kind of access is difficult – the client previously used log records that allowed them to see who logged into the system and when, but they couldn’t see what actions were taken. The system also wasn’t able to accurately distinguish between users, as a lot of them logged in under the same credentials.

Change: PrivX helped the customer to shift away from password sharing and implement a passwordless approach, using ephemeral certificates authentication and MFA. PrivX also gives the customer a complete and comprehensive record of all changes made in their digital systems which improves security, makes identifying problems easier, and simplifies the required audits. Like this, monitoring of users’ access is easy, as all users are tracked based on their individual authentications. PrivX also allows for access to be set up based on roles, with just-in-time, temporary access rights. Once the given time period is over, the access is automatically revoked.

Lastly, the customer benefited from a swift deployment of PrivX which took only two weeks, compared to other PAM solutions that might take up to several months to implement.

Read more

PrivX_HongKonguni_CSwebpage

Leading university centralizes and standardizes access management to improve security

Premise: The customer, one of the most prestigious universities in Hong Kong, works with an exceptionally high number of third-party vendors, contractors, and users. The university is structured into independent departments and to receive access to the university systems, the departments and third-party actors were sharing passwords.

Challenge: Despite the high demand for access, the process of receiving access to the systems was decentralized and complicated. Each department had their own request and approval workflows, which were handled manually. That was also complicated for third-party vendors who needed to work with various departments – each request and access process was different.

On top of that, sharing passwords was not secure nor ideal for the educational institution. The university also lacked the ability to track and record who was accessing their systems.

Change: The university decided to introduce PrivX to their systems, to standardize access management across departments, improve security, and enable role-based access.

PrivX solved the password sharing issue, as it utilizes a password-free approach to access management. The departments now use ephemeral certificates, instead of passwords, and users are authenticated through MFA to ensure that only approved users are granted access.

PrivX also helped to centralize access management for the various departments, as it allows for access requirements to be tailored to each department’s needs. Admins at each department can define various degrees of access and assign appropriate roles internally as well as externally. This system is also easier for the third-party actors, as now they can request access for various departments in exactly the same way.

The PrivX solution also offers session monitoring, so the university can now track and record who received access, who granted the approval, what actions were taken in the systems, etc.

Read more

PrivX_Industrialequipment_CSwebpage

Secure role-based access for maintenance engineers

Premise: The customer is a leading manufacturing company operating in the field of industrial equipment. As a part of their services, the business offers remote maintenance of their operational technology (OT) devices.

The customer is using multiple connection protocols (including SSH, RDP, and VNC) that were previously managed via a combination of VPN- and firewall-based security controls.

Challenge: The prior security controls lacked granularity and functionality that the customer needs to be able to provide their services easily and securely. The previous solution lacked transparency and proper auditing capabilities. There was a clear need for a lean and easy-to-use solution that would provide secure access between the cloud, customer facilities, and end-target devices.

Change: The access to OT target devices is now done via the PrivX OT Edition solution, which is utilized as a part of the customer’s own service business. Maintenance engineers have access to over 30k devices in various customer environments in a fast and secure way. They are granted just enough access (JEA) in a just-in-time (JIT) fashion.

The PrivX OT solution provides the customer with a centralized management system that ensures increased, layered security. The system also provides improved verification capabilities to identify and authenticate users, without the end-users seeing any of the vaulted secrets. Additionally, the customer can audit and monitor maintenance-related sessions through optional sessions recording.

Read more

PrivXMSP_SSH_case_study_Forest_industry

Secure Remote Access (SRA) in the forest industry

Premise: The customer is a manufacturer of fiber products, wood products, molecular bioproducts, and low-emission energy for the forest industry. They have more than 50 sites in 12 countries around the globe.

Challenge: With their multiple production sites, the business needed a transparent remote access solution, so their trusted vendors can access the sites securely. The customer had several clear requirements, including the need for an efficient and reliable approval process for session requests, limitations to view other vendor options when requesting access, or capability for each site to manage their own access and approval processes.

Change: The customer selected PrivX by SSH as their secure remote access solution. We at SSH worked very closely with the customer to achieve their objectives, including the development of new features not existing in the proposed solution.

When fully deployed, PrivX allows the customer to provide secure remote access to their trusted vendors. It provides access just-in-time (JIT) and with just-enough-access (JEA) – this allows external users to request session-specific access to just the right targets. Additionally, PrivX allows each production site to individually configure and manage users, roles, and end targets.
 
Read more
Enterprise Key Management

PrivX Key Manager Case studies

UKM_Financialinstitute_CSwebpage

Finance compliance audit success

Premise: The customer is a global bank whose brand is associated with trust and prosperity. Therefore, protecting the brand, passing internal as well as external audits, and having control over trusted access are essential.

However, when the customer ran an internal audit, it revealed an SSH keys vulnerability. The company’s developers were able to bypass existing privileged access management (PAM) solutions due to the unmanaged state of SSH keys. The bank immediately started looking for a solution that would help them regain full control over their SSH keys.

Challenge: Due to large server volumes, heterogeneous platforms, and wide software and vendor diversity, the customer’s IT environment requires strict SSH key management. So, the needed solution had to be deployed with minimal disruptions to the existing processes and operations. In other words, the deployment had to be risk-free and non-disruptive.

Additionally, the customer required not just strong expertise in the field, but also consultation and assistance services during planning, deployment, and rollout of the solution.

Change: SSH, as the original inventor of the SSH protocol, was a clear source of expertise for the customer. Also, due to the complexity of the environment and the strict requirements, SSH’s solution and services were a clear choice.

The PrivX Key Manager solution focuses on workflows for keys management, compared to competing solutions that are based on certificate management systems retrofitted for SSH keys. PrivX Key Manager discovers the trust relationships, monitors the usage of SSH keys, remediates the access to comply with policy, and manages the SSH-based access centrally. All this allowed the customer to regain control over the entire trusted access lifecycle.

Read more

UKM_Top15bank_CSwebpage

Prevent PAM bypass and regain control

Premise: The customer, one of the largest banks in the world, was notified about a security and compliance issue discovered during an external audit.

The bank was using OpenSSH to manage their mission critical transactions. However, the audit showed that they need a new solution to handle their identity and access controls for application-to-application access and privileged users.

Challenge: The audit revealed a lack of governance over SSH keys, which grant access to critical systems and enable functions crucial to many banking operations. The unmanaged access system was violating compliance mandates (MAS and SOX) and posed a huge threat to the existence of the bank.

The customer needed a solution that would come with advice, support, and field expertise, so they can design and implement the solution quickly and efficiently. The bank realized that they don’t have sufficient expertise in-house, therefore, they turned to external vendors.

Change: The customer selected SSH to help them manage the challenge. Firstly, they deployed the SSH Key Discovery tool to see what the actual scope of the issue is. The institution had over 1.5 million SSH user keys, including more than 150 thousand keys granting root access, but without a clear track of who was in possession of those private keys.

Based on the discoveries, they implemented the PrivX Key Manager solution. PrivX Key Manager offers the bank monitoring and auditing features – they can easily monitor key usage, and outdated keys can be automatically removed. PrivX Key Manager also actively monitors the environment and alerts administrators in case a policy violation occurs.

Read more

 

UKM_SarbanesOxley_CSwebpage

Regaining Sarbanes-Oxley (SOX) compliance

Premise: The customer, a leading multinational energy company, supplies energy products and provides related services. These consist of, for example, service stations for cars and trucks, and general retail operations for automotive fuels, fuel oil, asphalt, etc.

The customer’s service segment operates an ICT production environment with over 500 servers. The secure access and file transfers to the servers are done via SSH protocol. At the same time, the environment includes a variety of SSH implementations from various vendors.

Challenge: The primary need of the customer was to comply with the regulatory requirements set in the Sarbanes-Oxley Act (SOX), which requires controlled and auditable privileged access. Even though they have previously invested in a privileged access management (PAM) solution, they wanted to improve their overall security. The client also required a transparent and non-disruptive installation process.

Based on the customer’s situation, they needed a centralized, interoperable, robust SSH user key management solution that controls the privileged SSH access in a multivendor environment. That is not easy as the environment includes various SSH server implementations across a various selection of versions and operating systems. Additionally, the solution must be capable of tracking key sign-offs by application owners.

Change: The customer chose PrivX Key Manager as the solution to manage their SSH environment. The deployment of the solution was done in several stages to ensure no disruptions during the process. After each stage, the results and benefits were measured, analyzed, and acted on.

The final, deployed solution discovers SSH keys in the complex environment and finds out who has access to what. It also monitors the use of SSH keys and their authorizations. The solution adds, removes, and rotates SSH identities and keys as well as monitors the SSH use, in line with the SOX regulations. Additionally, the solution enhances the company’s operational and cost efficiency as the automated management of keys decreased the manual workload of the IT staff.

Read more

 

UKMTectia_FinancialIT_CSwebpage

Securing Financial IT Environment

Premise: The customer is a large Asian financial institution, one of the biggest in the world, with billions of transactions happening every day. Thus, it is essential that their complex IT environment, which is being accessed by in-house as well as third-party experts, is secure. Another important factor is compliance with regulations.

Challenge: The company uses SSH keys to manage access to their IT environment securely. SSH keys are crucial and convenient for the customer, as they, for example, automate critical machine-to-machine connections that transfer sensitive information, like financial transactions. However, the keys also pose a security risk, due to their volume and variety. Thousands of keys are created every day, at the same time, many of the already existing keys are unused or outdated. Additionally, all the company’s SSH keys were previously stored in a single folder.

This made managing the keys and searching for the right keys extremely slow and inefficient. The company needed a solution that would help them regain control and manage their SSH keys.

A separate security risk was connected to secure file transfers (SFTP). As the company’s employees and third-party vendors heavily rely on file transfers within the organization, they need a secure way of managing the data-in-transit. So, the customer also needed a solution that would protect their data-in-transit without slowing down their staff’s productivity.

Change: To deal with both challenges, the company decided to choose solutions by SSH: PrivX Key Manager and Tectia SSH Client/Server.

The PrivX Key Manager solution secures the customer’s SSH keys by automatically scanning the IT environment in order to identify and create an accurate SSH keys inventory. This makes searching for the right key and establishing a connection much faster. PrivX Key Manager also keeps track of all keys’ validity and helps the organization to comply with security regulations.

To secure their file transfers, the customer selected Tectia SSH Client/Server. One of the deciding factors was that Tectia SSH provides the company with instant, local support. Additionally, the solution supports secure and compliant X.509 certificate-based authentication. It also allows transferring of large files up to twice as fast as OpenSSH.

Read more

 

UKM_Bigdata_CSwebpage

Real-time cloud SSH key provisioning

Premise: The customer is a provider of a big data analysis solution to a range of end customers, from SMEs to big corporates. Their solution is provided as a managed cloud service. Therefore, it requires operators to have fully audited access to the end customers’ data in the cloud. The access is managed via the SSH protocol and connections are established with strong public-key authentication.

Challenge: The client was looking for an operationally efficient and cost-efficient solution that would integrate with their own user orchestration solution for user provisioning and de-provisioning. They required time-based access management that would allow them to provide access to their operators as well as server accounts. The customer also required a certain level of automation. In other words, they wanted to be able to define and approve the access validity period. Then once the access would expire, it would be automatically de-provisioned.

Change: Based on the criteria, product and service maturity, and subject matter expertise, the customer selected the PrivX Key Manager as their solution.

The User Portal of PrivX Key Manager provides the customer with a single, unified interface to manage all request and approval workflows. The access, key provisioning, and key de-provisioning are done by the key management functions. PrivX Key Manager also tracks the validity of the access and once it expires, the access is automatically removed. The solution also tracks all requests, approvals, and other actions.

The PrivX Key Manager solution is fully integrated with the customer’s existing security solutions and within their cloud change management and provisioning solutions. Meaning, the access management workflow is fully integrated and automated, which provides wide visibility and easy governance.

Read more

UKMZeroTrust_Globalmanufacturer_CSwebpage2

Towards the keyless future with PrivX Key Manager Zero Trust

Premise: The customer is a manufacturing business with an estate of more than 6500 servers. To manage their secure access to and between the servers, they used SSH keys. The customer has a privileged access management (PAM) solution in-house, however, it was managing only part of their keys.

Challenge: The prior setup accounted only for around 20% of SSH connections, even with a PAM solution in place. The rest of the keys went unmanaged which led to an internal compliance audit failure. The customer knew that they must inspect the issue thoroughly.

Thanks to the customer’s own comprehensive discovery process of SSH keys, they gained a deep understanding of the scope and complexity of the challenge and recognized that they would not be able to manage the issue in-house. Therefore, they were looking for a solution provider with extensive expertise in the industry. They also required the solution to smoothly integrate and cooperate with their existing PAM while adding the necessary Enterprise Key Management capacity.

They wanted to find a solution that would help them manage their rogue keys challenge as well as prepare them for the keyless future. Their vision was not to be content with just managing keys but to migrate to a keyless approach.

Change: The company selected the PrivX Key Manager Zero Trust solution by SSH. They valued the experience and expertise of SSH as the inventor of the Secure Shell protocol.

PrivX Key Manager Zero Trust helps with mapping, managing, and automating of SSH keys access. The solution also smoothly integrates with other PAM solutions. At the same time, it radically reduces the number of SSH keys that need to be managed – instead, it supports the transition towards keyless SSH access through short-lived, ephemeral certificates.

Currently, the customer adopted and fully migrated to keyless, just-in-time access. PrivX Key Manager helped the customer to solve their current challenge and, at the same time, it prepared the customer’s environment for the keyless approach to SSH access management.

Read more

secure remote access, SFTP, tunneling & Mainframe security

Tectia SSH Client/Server Case studies

UKMTectia_FinancialIT_CSwebpage

Securing Financial IT Environment with SFTP

Premise: The customer is a large Asian financial institution, one of the biggest in the world, with billions of transactions happening every day. Thus, it is essential that their complex IT environment, which is being accessed by in-house as well as third-party experts, is secure. Another important factor is compliance with regulations.

Challenge: The company uses SSH keys to manage access to their IT environment securely. SSH keys are crucial and convenient for the customer, as they, for example, automate critical machine-to-machine connections that transfer sensitive information, like financial transactions. However, the keys also pose a security risk, due to their volume and variety. Thousands of keys are created every day, at the same time, many of the already existing keys are unused or outdated. Additionally, all the company’s SSH keys were previously stored in a single folder.

This made managing the keys and searching for the right keys extremely slow and inefficient. The company needed a solution that would help them regain control and manage their SSH keys.

A separate security risk was connected to secure file transfers (SFTP). As the company’s employees and third-party vendors heavily rely on file transfers within the organization, they need a secure way of managing the data-in-transit. So, the customer also needed a solution that would protect their data-in-transit without slowing down their staff’s productivity.

Change: To deal with both challenges, the company decided to choose solutions by SSH: PrivX Key Manager and Tectia SSH Client/Server.

The PrivX Key Manager solution secures the customer’s SSH keys by automatically scanning the IT environment in order to identify and create an accurate SSH keys inventory. This makes searching for the right key and establishing a connection much faster. PrivX Key Manager also keeps track of all keys’ validity and helps the organization to comply with security regulations.

To secure their file transfers, the customer selected Tectia SSH Client/Server. One of the deciding factors was that Tectia SSH provides the company with instant, local support. Additionally, the solution supports secure and compliant X.509 certificate-based authentication. It also allows transferring of large files up to twice as fast as OpenSSH.

Read more

 

Tectia_ZT_case_study

Improved Security with Quantum-Safe Technology and Zero Trust Access Management

Read more

 

secure data & information sharing

SSH Secure Collaboration Case Studies

DeltagonSuite_SSH_Healthcare_case_study

Data Access, Data Protection, and Secure Data Intake

Read more

 

DeltagonSuite_SSH_Business-funding_case_study

Sensitive Data Intake, Processing, and Storing

Read more

 

Customer quotes

 

It took us four hours to set up the test environment from start to finish. And the amazing part was when we connected to Azure, we could retrieve all the VMs right away without any kinds of hassle.”

sami_saisa

Sami S?is?, Director, Head of Strategic Development, MOST Digital

PrivX makes life easier.”

IT manager at a large industrial equipment company

SSH IS TRUSTED BY MORE THAN 5000 LEADING COMPANIES WORLDWIDE

Learn more about our products

We have a comprehensive solution portfolio for enterpise key management, privileged access management, secure file transfers, remote access, secure tunneling and encrypted e-communications.
 

View Products

脸上长白斑是什么原因引起的 说女人强势是什么意思 因为我们没有什么不同 精尽人亡什么意思 桔梗是什么东西
上帝叫什么名字 伤情鉴定需要什么材料 来大姨妈不能吃什么 肠化十是什么意思 别有洞天是什么生肖
金银花入什么经 4月30号是什么星座 龟头炎用什么软膏 桃和什么不能一起吃 面瘫是什么原因造成的
送男人什么礼物最难忘 上海曙光医院擅长什么 lu是什么单位 中核集团是什么级别 举的部首是什么
陌上人如玉是什么意思baiqunet.com 子宫肌瘤吃什么能消除hcv7jop4ns7r.cn 双脚发热是什么原因hcv7jop6ns9r.cn 尿蛋白高吃什么药hcv8jop5ns5r.cn 快速补血吃什么hcv8jop8ns2r.cn
72年鼠是什么命hcv8jop6ns9r.cn ca医学上是什么意思hcv8jop7ns6r.cn 澈是什么意思hcv7jop4ns6r.cn hp是什么单位jasonfriends.com 三什么一什么hcv9jop4ns6r.cn
米西米西是什么意思hkuteam.com 煦字五行属什么hcv8jop7ns9r.cn fast什么意思gangsutong.com 芭蕉花炖猪心治什么病hcv8jop5ns4r.cn 为什么感冒吃冰棒反而好了hcv9jop3ns5r.cn
突然眩晕是什么原因hcv8jop1ns9r.cn 喝什么茶叶减肥效果最好hcv9jop0ns7r.cn 易激惹是什么意思baiqunet.com 昝是什么意思hcv9jop0ns4r.cn 斛什么意思zhongyiyatai.com
百度