Products

Cloud Audit & Monitoring Service

Best practices for securing privileged access recommend auditing everything. An audit trail of all actions attributed to a specific user feeds SIEM tools to stop in-progress attacks and aids forensic analysis into abuse of privilege. Because privileged sessions leveraging stolen credentials are a primary attack vector, they can be monitored and terminated in real-time. Video recordings of sessions on critical infrastructure are available for review or use as evidence in the case of a security breach. Centrify Cloud Audit and Monitoring Service combines host-based with gateway-based capabilities for maximum coverage. For even greater protection and visibility, take advantage of host-based advanced monitoring at the process level.

dia-Monitor-sessions-2

Advanced Host-Based Session Recording, Auditing, and Reporting

Make it impossible to bypass session recording with host-based auditing that attributes activity to the individual user. Discover rogue activity such as creating and storing SSH key pairs that make it easy to circumvent security controls. Audit all SSH session activity at the shell and process level in forensic detail for security review, corrective action, and compliance reporting.

gateway

Gateway Session Recording, Monitoring & Control

Gain new levels of oversight for remote sessions to critical infrastructure. Security teams watch privileged sessions in real-time and can instantly terminate suspicious sessions through the Centrify Platform. Gateway-based auditing captures sessions where host-based auditing is not possible for a complete view of privileged access and activity.

There isn’t a regulation that Centrify hasn’t helped us to meet. Today, every time an administrator touches a server, I have a record of it. I can pull a report, print it, and hand it to the auditor.

Peter Manina, IT Specialist and UNIX Systems Architect, State of Michigan Department of Technology, Management and Budget

Learn More About Centrify Cloud Suite

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial