•  Technik (+49) 089 420447-30
  •  Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!   |
  •  Vertrieb (+49) 089 420447-20
  •  Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!

Testversion anfordern

Sie möchten das Produkt testen?
Gerne stellen wir Ihnen eine Testversion zur Verfügung.
Bitte nehmen Sie Kontakt mit uns auf.

Testversion anfordern

s5 logo


SSH Key Management - Universal SSH Key Manager Datenblatt herunterladen

Download

SSH Key Management
Universal SSH Key Manager

Whether you use Tectia SSH, OpenSSH or both, Universal SSH Key Manager™ delivers a fully interoperable and scalable SSH key management solution. It allows you to save time and money by eliminating the complex, manual work required to manage enterprise SSH environments, by reducing the risk of unauthorized access from both internal and external actors, and by improving visibility and compliance.

Universal SSH Key Manager is the only SSH key management solution that goes beyond just discovery. SSH Universal Key Manager is designed to deliver effective secure shell key management involves three core capabilities:

  • Discovery: The ability to see into your environment, understand your trust relationships and identify risks are the fundamental first steps in the key management process - but don't stop there.
  • Management: The ability to act on the information you have discovered by creating, deploying, removing and rotating keys through a centralized solution is critical. In addition, you need the capability to restrict how a key is set up, who can use it and where it can be used. These key management capabilities truly drive the value of your key management implementation by reducing costs, ensuring compliance and improving your security posture.
  • Monitoring & Reporting: Managing secure shell keys is a big data challenge. In order to be effective you will need complete reporting on your environment. To make monitoring & reporting truly impactful, a deep audit trail of all actions taken, a centralized dashboard and integration into your information security architecture (SIEM) are necessary.

In addition, only SSH Communications Security is trusted by leading Fortune 500 global companies to safely remediate their secure shell access control issues without putting mission critical business operations at risk. As the original inventors of the SSH protocol, only SSH can deliver the technology and services necessary to enable better security and compliance in your encrytped secure shell environments.

SSH's platform based approach to overall secure shell management will enable you to not only manage keys but also scale to meet the needs of your entire secure shell environment's lifecycle - from client/server deployments to access controls to privileged user monitoring and DLP capabilities. Only SSH's Information Assurance Platform can deliver all of this to your Tectia SSH and OpenSSH environments.
 


Compare Universal SSH Key Manager to any other solution on the market:
 

SSH Other Solutions
Discovery

Public & private key discovery

Yes Yes

Key size

Yes Yes

Key type

Yes Yes

Passphrase existence

Yes No

Key owner by user or user group

Yes Yes

Trust relationship per host & host groups

Yes No

Rogue keys

Yes Yes

Orphaned keys

Yes Yes

Unauthorized trust relationships

Yes Yes

Management

Agentless operation available

Yes No

Role-based access control

Yes No

Host grouping

Yes No

User/host authorization rules

Yes No

LDAP user integration

Yes No

Black list keys

Yes No

Create new private and public keys

Yes No

Deploy new public keys

Yes No

Remove public keys

Yes No

Rotate public keys

Yes No

Manage one-to-one and one-to-many relationships

Yes No

Define key size and algorithm

Yes No

Restrict key usage by command type

Yes No

Restrict trust relationship per source and destination

Yes No

Integration into IT ticketing system

Yes No

Monitoring and Reporting

Key, host and user discovery reporting

Yes Yes

Key creation/removal/rotation reporting

Yes No

Out of policy alerts

Yes No

Key activity monitoring

Yes Limited

Deep audit trail

Yes Limited

SIEM/log management integration

Yes Limited

Export data to csv file

Yes Yes

Unsere Philosophie

Unser Ziel ist es, Sie bei der Lösung besonderer Sicherheitsprobleme im Internet, bei IT-Netzwerken sowie bei der Telekommunikation zu unterstützen.

Dieses Ziel erreichen wir durch die Qualität und Aktualität unserer Sicherheitsprodukte sowie durch Kompetenz und Einsatzbereitschaft unseres Teams.

Kontaktmöglichkeiten

Kontakt Vertrieb (Angebote,
Lizenzen, Bestellungen, uvm.)
  • (+49) 089 420447-20
  • Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!
Kontakt Technik (Support,
Hilfe bei Einstellungen, uvm.)
  • (+49) 089 420447-30
  • Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!

Weitere Firmendetails

CyProtect AG - Internet Security

 

Adresse
Schatzbogen 58
81829 München
Deutschland
Fax
  • (+49) 089 420447 79

Kontaktformular

Email:
Betreff:
Nachricht:
Wie viele Stunden hat ein Tag?