In many large organizations, Secure Shell is widely used to authenticate automated processes such as file transfers and backups, as well as privileged users such as systems administrators. These processes and users are typically authenticated via Secure Shell User Keys. Although SSH user keys often provide access to highly sensitive information and systems, most organizations have lost visibility and control over who possesses the keys and what specific authorizations they enable. This is a major access control and compliance issue that is quickly drawing the attention of auditors and regulators.
In this webinar, you will learn: