English

Session Recording and Monitoring

Monitor and Control Privileged Sessions Across Cloud and On-Premises

Detect suspicious user activity to alert in real time to stop breaches in progress. Monitor and control privileged sessions that leverage shared accounts and individual accounts with full video and metadata capture.

cps-priv-session-monitoring-nds-reverse.png

Thwart Attacks and Gain Granular Visibility into Privileged Activity

checkmark-in-circle-blue.png

Monitor privileged sessions across on-premises and cloud-based infrastructure

checkmark-in-circle-blue.png

Establish accountability by associating privileged activity with an individual

checkmark-in-circle-blue.png

Identify abuse of privilege with high-fidelity recordings of sessions and indexed session metadata

checkmark-in-circle-blue.png

Ensure session recording cannot be bypassed with host-based auditing

checkmark-in-circle-blue.png

Shell-level and process-level monitoring for high-risk systems that is virtually impossible to spoof

Gateway and Host-based Session Auditing and Video Capture

Capture and collect data in a high-fidelity recording of each privileged session on any server or network device across your on-premises and cloud-based infrastructure. Stores sessions in an easily searchable SQL Server database for a holistic view of exactly what happened on any system, by any or all users, and at any given time.

Learn More
pr-ss-ac-sc__session-auditing.png

Monitor and Terminate Suspicious Activity in Real-time

Gain new levels of oversight for privileged sessions on critical infrastructure. Administrative users watch activity in remote sessions in real-time and can instantly terminate suspicious sessions through the Centrify Admin portal.

watch_terminate_newui.png

Prevent Spoofed or Bypassed Access with Advanced Monitoring

Discover rogue activity such as the creation and storage of SSH key pairs that would make it easy to bypass security controls, and attribute activity to the individual user. Audit all SSH session activity at the process level in forensic detail for security review, corrective action and compliance reporting.

Learn More
adv_monitoring_videothumb.png

Easy Integration with SIEM, Alerting and Reporting Tools

Privileged access data is captured and stored to enable robust querying by log management tools and integration with external reporting tools. Streamlined integration with SIEM and alerting tools such as HP ArcSight, IBM QRadar and Splunk identify risks or suspicious activity quickly.

cps-splunk-siem-integration.png

Indexed and Searchable Database of Session Activity

Record all privileged sessions and metadata, attributing activity to an individual to deliver a comprehensive picture of intentions and outcomes. Searchable playback feature gives IT security managers and auditors the ability to see exactly what users did, and identify abuse of privilege or the source of a security incident.

Learn More
indexed-and-searchable.png

FEATURED VIDEO

Centrify Advanced Monitoring - Detect Malicious Activity in Scripts.

advanced-monitoring-scripts-video.png

In this second video in a series exploring Centrify’s advanced monitoring, learn how to stop a breach in progress and ensure individual accountability with full actionable context when an attacker or malicious insider attempts to obfuscate their intentions by hiding privileged activity inside a script file.