Perimeter
7/25/2012
08:04 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

SSH Communications Security Launches CryptoAuditor: Minimally-Invasive Enterprise Privileged User Access Auditing Solution

Helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with inline, real-time and transparent audit capabilities

LAS VEGAS, July 25, 2012, /PRNewswire/ SSH Communications Security, known the world over as the inventor of the SSH protocol, today announced the launch of its CryptoAuditor™ solution at the Black Hat USA 2012 conference. The new offering helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with inline, real-time and transparent audit capabilities for financial service providers, retailers and other enterprises transmitting sensitive information. CryptoAuditor is the second module released this year as part of the company's Information Assurance Platform.

Click here for more of Dark Reading's Black Hat articles.

"We launched the Universal SSH Key Manager module earlier this year at RSA and we have received an excellent response from our customers since then," said Matthew McKenna, SSH vice president of sales and marketing. "With the launch of CryptoAuditor, SSH provides the next logical extension to our platform, a fully transparent, centralized privileged access auditing solution, delivering strong data-in-transit security that requires no changes to existing network architecture."

The Universal SSH Key Manager module and the CryptoAuditor module integrate smoothly into existing enterprise security solutions – including DLP and SIEM – providing deeper audit and forensics capabilities into encrypted traffic.

Both modules employ sophisticated key management capabilities, including group-based access controls and automatic key discovery, deployment and removal. This critical link between the two modules allows for fully transparent inline deployments, providing strong security, minimal system latency, operating cost reduction and the ability to deploy a single-sign-on effect throughout the entire enterprise.

"Our platform's key management capabilities provide controls over who can gain access to what information in secure shell environments," said Jason Thompson, SSH director of global marketing. "By combining our key management capabilities with CryptoAuditor, organizations will see immediate ROI by solving issues surrounding auditing, control and key management."

CryptoAuditor Key Facts:

  • Inline deployment capabilities eliminate costly and time-consuming workarounds and processes required by first-generation solutions
  • Reduces the risk from advanced external threats by controlling and monitoring information as it moves across the environment, preventing data loss with an internal policy engine and DLP/SIEM integration capabilities
  • Delivers immediate control and accountability over privileged access users, closing significant security gaps in information security architecture
  • A minimally invasive approach that captures a broad array of traffic across all needed audit points while remaining transparent to administrators 
  • Designed to easily deploy across distributed architecture, making management easy through a one-console approach

About SSH Communications Security Founded in 1995, SSH Communications is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe, including 7 of the Fortune 10, trust our Information Integrity Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. We operate in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company shares (TEC1V) are quoted on the NASDAQ OMX Helsinki.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio