Lieberman RED – Rapid Enterprise Defense Identity Management makes it easy for you to manage SSH keys to access physical and virtual IT hardware, applications and more — helping you mitigate cyber attacks and prevent damage from malicious insiders.
RED Identity Management enables you to use SSH keys to connect to and manage credentials on target systems — a much more secure mechanism for connection than a password.
Additionally, RED Identity Management can use SSH keys to automatically connect a user to a target system with a specific application, limiting their access to the system to specific commands and accesses available to the program. This allows users to work more securely within the environment.
SSH Key Management
Today SSH provides highly privileged access to IT resources across the enterprise. RED Identity Management gives you the visibility to know what systems and applications are accessed with SSH. RED Identity Management also helps you manage the lifecycles of critical SSH key pairs, helping you ensure that keys provide the right users correct access to the right applications and systems.
RED Identity Management’s SSH key management features include:
- SSH user key authentication for discovery and remediation; private keys can be loaded in a secure database and used instead of user names and passwords
- SSH key authentication for password management for enabling secure, privileged access in addition to the password authentication option
- SSH key authentication for applications to allow the secure launch of applications, without the need to disclose passwords
- SSH key rotation for your most critical SSH key pairs
Comprehensive Solution for Securing SSH Keys
RED Identity Management also provides an application launcher with unlimited bastion hosts and SSH proxy hosts — leveraging SSH Keys — that can be used to quickly launch corporate applications, both on premises and in the cloud, in a secure environment. The privileged operations performed through the application launcher are automatically audited and recorded.
Contact us to learn how Lieberman Software can help you secure your organization’s privileged accounts.