The Wayback Machine - https://web.archive.org/web/20161008000222/http://www.ssh.com:80/privileged-access-control/dev-ops

Privileged access control for developers and administrators working within a Devops framework must be transparent. Based on the principles of agility and speed to market, developers and business operations must be able to use their native tools with no disruption to their work.

Key and Access Lockdown and Control

Icon

Transparent Deployment

  • Functions in either a bastion, bridge or router mode.
  • No agents to deploy. No changes to end user experience or processes. No portals to go through.
Icon

Full Session Monitoring, Audit and Control

  • Monitor and record SSH, SFTP, RDP, SSL/TLS/HTTPS
  • Adhere to compliance mandates while overseeing access to critical infrastructure
Icon

Detect and Respond

  • In tandem with DLP, AV, and IPS systems block inbound or outbound malicious actions in real time.
  • Prevent the infiltration of malware, command misuse and data exfiltration in real-time.
Icon

Customizable Audit Policies

  • End to end tracking of what user may access and how and what commands can be used
  • Keep granular control and visibility as needed to high value infrastructure
Icon

AD/LDAP Integration

  • Seamlessly integrate to existing AD/LDAP infrastructure to simplify authentication
  • Control which users have access to which servers and which actions they can perform

CryptoAuditor provides visibility and control of privileged access throughout the DevOps lifecycle with no disruption to operations.


Optimal for elastic cloud and virtualized environments, CryptoAuditor can inspect both interactive and application to application based access, detect anomalies, and respond to threats in real–time.

In tandem with Conjur, CryptoAuditor controls what commands can be run, stores credentials in a secure vault, and creates policies for user and host groups leveraging AD and LDAP infrastructures.

Learn more about CryptoAuditor