Resources

Centrify Audit and Monitoring Service

Audit and Monitoring Service

Centrify Audit and Monitoring Service

Read the Data sheet

For privileged sessions, it is of course best practice to audit everything. With a documented record of all actions performed, audit logs not only can be used in forensic analysis to find exactly the issue, but also to attribute actions taken to a specific user. Because these sessions are so critical, it is also best practice to keep a video recording of the session that can be reviewed or used as evidence for your most critical assets, or in highly regulated industries. There are multiple regulations including PCI-DSS for payment card data that specifically requires this level of auditing. The Centrify Audit and Monitoring Service data sheet provides an overview on how customers can fulfill their compliance mandates through auditing and reporting, as well as shut down any dangerous workarounds by putting host-based monitoring in place.

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial