Session Recording and Monitoring
Monitor and Control Privileged Sessions Across Cloud and On-Premises
Detect suspicious user activity to alert in real time to stop breaches in progress. Monitor and control privileged sessions that leverage shared accounts and individual accounts with full video and metadata capture.
Gateway and Host-based Session Auditing and Video Capture
Capture and collect data in a high-fidelity recording of each privileged session on any server or network device across your on-premises and cloud-based infrastructure. Stores sessions in an easily searchable SQL Server database for a holistic view of exactly what happened on any system, by any or all users, and at any given time.
Monitor and Terminate Suspicious Activity in Real-time
Gain new levels of oversight for privileged sessions on critical infrastructure. Administrative users watch activity in remote sessions in real-time and can instantly terminate suspicious sessions through the Centrify Admin portal.
Prevent Spoofed or Bypassed Access with Advanced Monitoring
Discover rogue activity such as the creation and storage of SSH key pairs that would make it easy to bypass security controls, and attribute activity to the individual user. Audit all SSH session activity at the process level in forensic detail for security review, corrective action and compliance reporting.
Easy Integration with SIEM, Alerting and Reporting Tools
Privileged access data is captured and stored to enable robust querying by log management tools and integration with external reporting tools. Streamlined integration with SIEM and alerting tools such as HP ArcSight, IBM QRadar and Splunk identify risks or suspicious activity quickly.
Indexed and Searchable Database of Session Activity
Record all privileged sessions and metadata, attributing activity to an individual to deliver a comprehensive picture of intentions and outcomes. Searchable playback feature gives IT security managers and auditors the ability to see exactly what users did, and identify abuse of privilege or the source of a security incident.
Centrify Advanced Monitoring - Detect Malicious Activity in Scripts.
In this second video in a series exploring Centrify’s advanced monitoring, learn how to stop a breach in progress and ensure individual accountability with full actionable context when an attacker or malicious insider attempts to obfuscate their intentions by hiding privileged activity inside a script file.