CyberArk introduces SSH Key Management
2014-10-24CyberArk has introduced the comprehensive Secure Shell (SSH) key management with the release of version nine of CyberArk Privileged Account Security Solution. Customers can now secure and manage SSH keys as well as other privileged credentials in a single, integrated platform to identify, manage and protect against advanced external attackers and malicious insiders.
“Cyber attackers know that hundreds of thousands of SSH keys exist in large enterprises and they exploit this situation to gain privileged access to critical systems. In an attempt to simplify trust and connectivity, organizations unwittingly leave giant holes in their defences,” said Roy Adar, vice president of product management, CyberArk. “Our focus is on preventing exploited privileged accounts through any attack vector, and therefore the protection of SSH keys is a natural expansion for our Privileged Account Security solution – one that will immediately improve our customers’ security.”
Widely used by IT teams to get direct, root access to critical systems, SSH keys are often created without any oversight or management, essentially providing ongoing, uncontrolled privileged access to the target system. Research by Ponemon Institute showed that three out of four enterprises have no security controls in place for SSH keys and that 51 per cent of enterprises have already experienced an SSH key-related compromise. “The Ponemon 2014 SSH Security Vulnerability Report,” Feb. 2014 Further, because SSH keys are commonly used in automated application-to-application authentication, keys can be created, distributed and never thought of again, leaving systems riddled with unknown and undocumented vulnerabilities ready to be exploited.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.