Auditing and Reporting
Auditing and Reporting for Privileged Access Streamlines Regulatory Compliance
Improve accountability, conduct forensic investigations and prove compliance with government regulations and industry mandates.
Demonstrate Compliance and Simplify Forensic Investigations
Show that security controls are in place and working as designed, and provide proof of compliance. Search and find session recordings by servers, users or custom searches. You can find all sessions for a particular user or server, or for a set of custom criteria, simplifying forensic investigations and proactively identifying insider threats or suspicious activity.
Establish Individual Accountability
Recorded privileged sessions and activity are attributed to an individual to deliver individual accountability. Searchable playback feature gives IT security managers and auditors the ability to see exactly what users did, and identify the source of a security incident.
Streamlined Integration with SIEM, Alerting and Reporting Tools
Privileged access data is captured and stored to enable robust querying by log management tools and integration with external reporting tools. Streamlined integration with SIEM and alerting tools such as HP ArcSight, IBM QRadar and Splunk help further identify risks or suspicious activity quickly.
Report on Access, Checkout/Session and Use of Privilege Across Infrastructure
Gain comprehensive visibility with unified access and activity reporting based on a common platform. Customizable and built-in queries and out-of-box reports for SOX and PCI regulatory compliance provide information on privileged account access controls, password checkout and privileged sessions across Windows, Linux, UNIX and network infrastructure.
Becoming PCI DSS Compliant
The PCI DSS 3.2 consists of 12 requirements spread across six domains. Since the core concern of PCI is the protection of cardholder data, these requirements focus on user access to the servers that host this data, or through which such data passes. This white paper examines each of the 12 requirements and identifies the associated Centrify Infrastructure Services and capabilities that customers can leverage to help achieve compliance.