REPORTING AND AUDITING FOR PRIVILEGED ACCESS
Report and audit privileged sessions that leverage shared accounts and individual accounts with full video and metadata capture. The Centrify Audit and Monitoring Service allows customers to conduct forensic analysis and leverage high-fidelity recordings for audit and compliance purposes.
Gain Granular Visibility into Privileged Activity
Monitor privileged sessions across on-premises and cloud-based infrastructure.
Establish accountability by associating privileged activity with an individual.
Establish a single source of truth for individual and shared accounts — leveraging a common tool set regardless of account type.
Ensure that any or all the privileged sessions you want are audited across Windows, Linux and UNIX, based on your audit policy. Audit all sessions or sessions based on users, computers, roles or use of privilege.
Identify abuse of privilege with high-fidelity recordings of sessions and indexed session metadata.
Search for and quickly find specific events in a session and jump directly to that event in the session capture; replay any portion of the session to see every action taken by a user and every system response.
Prove privileged access is controlled and audited to satisfy regulatory compliance for SOX, HIPAA, FISMA, NIST, PCI, MAS and others.
Pause, rewind, fast-forward, scrub through the timeline, or jump to a specific point in the video replay.
Gateway-Based Session Auditing and Video Capture
Capture and collect data in a high-fidelity recording of each privileged session at the proxy-level. Stores sessions in an easily searchable SQL Server database for a holistic view of exactly what happened. Centrify Audit and Monitoring Service’s unique, searchable playback feature gives IT security managers and auditors the ability to see exactly what users did and the results of their action and identify privilege abuse or the source of a security incident.
Indexed and Searchable Database of Session Activity for Individual Accountability
Record all privileged sessions and metadata, attributing activity to an individual to deliver a comprehensive picture of intentions and outcomes. Searchable playback feature gives IT security managers and auditors the ability to see exactly what users did and identify abuse of privilege or the source of a security incident.
Demonstrate Compliance and Simplify Forensic Investigations
Show that security controls are in place and working as designed and provide proof of compliance. Search and find session recordings by servers, users or custom searches. You can find all sessions for a particular user or server, or for a set of custom criteria, simplifying forensic investigations and proactively identifying insider threats or suspicious activity.
Report on Access, Checkouts, Sessions and Use of Privilege Across Your Infrastructure
Gain comprehensive visibility with unified access and activity reporting based on a common platform. Customizable and built-in queries and out-of-box reports for SOX and PCI regulatory compliance provide information on privileged account access controls, password checkout and privileged sessions across Windows, Linux, UNIX and network infrastructure.