Prevent Spoofed or Bypassed Privileged Access
Auditing and recording sessions on the server being managed results in deeper insights and better control over privileged access in your environment. No matter how or where sessions originate, Centrify's host-enforced auditing and recording cannot be bypassed and ties all privileged activity to an individual.
Thwart Attacks and Gain Granular Visibility into Privileged Activity
Host-Based Session Auditing and Video Capture
Prevent malicious attackers from bypassing privileged access audit controls by capturing and collecting detailed metadata and a high-fidelity recording of every session — on the server. Centrify Platfform insights gathers audit trails and session events that detail privileged activity on any server, by any user, and at any given time.
Threat Detection and Deep Forensics with Process-Level Auditing on Linux
Centrify’s host-enforced auditing uniquely monitors at the shell and process levels and is virtually impossible to spoof. Malicious commands hidden in shell scripts or behind aliases are detected with process level monitoring and sent to SIEM systems for alerting.
Monitor for Creation of Backdoor Accounts on Linux
Centrify monitors for the creation of backdoors whose existence makes privileged access to infrastructure convenient instead of secure. Centrify Audit and Monitoring Service detects a growing attack surface by identifying changes to critical files — such as creating an SSH key — in real-time and triggers security alerts.
Simplify Forensic Investigations with Indexed Privileged Activity
Find suspicious user activity, conduct forensic investigations, and prove compliance with an easily searchable archive of all privileged sessions and indexed events. Search by user, system, or event and playback from the point that privilege abuse occurred to determine the source of a security incident.
Govern Privileged Access and Prove Regulatory Compliance
Reconcile approved privileged access versus actual activity on a server for governance. Gain visibility into privileged access and events through Centrify insights' customizable queries. Prove compliance with regulations and mandates through reporting on privileged access controls, activity, and session events across Windows, Linux, and UNIX.
Streamlined Integration with SIEM, Alerting and Reporting Tools
Privileged access data is captured and stored to enable robust querying by log management tools and integration with external reporting tools. Streamlined integration with SIEM and alerting tools such as Micro Focus® ArcSight™, IBM® QRadar™ and Splunk® identify risks or suspicious activity quickly.
See Centrify Audit and Monitoring Service in Action
Detect Malicious Activity in Scripts
Detect External Devices Connected to Critical Servers
Watch this video to learn how Centrify’s host-based auditing detects malicious activity in scripts.
Watch this video to learn how Centrify Server Suite detects external devices connected to critical servers.
Learn More About Centrify Server Suite
Centrify Server Suite
Minimize Your Attack Surface and Control Privileged Access to Your On-Premises and Cloud-Hosted...
A Leader in The Forrester Wave: Privileged Identity Management (PIM), Q4 2020
The Forrester Wave™: Privileged Identity Management, Q4 2020 includes 10 providers based on a 24...