You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators
- LANGUAGE: English DATE: Thursday, September 01, 2016 TIME: 11:00am CEST
How lax infrastructure management may turn the ubiquitous security tool into a ticking time bomb
Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.
Unfortunately, as opposed to traditional certificate-based public key infrastructures, SSH does not require nor define a central authority for key management, and most organizations leave these functions to end users. With time, this has led to uncontrolled proliferation of keys spread across a large number of servers, devices and workstations, which makes it increasingly difficult to keep track of them, control who has access to where and revoke previously granted access rights.
Can you even tell how many SSH keys are currently deployed across your corporate network? Dozens? Hundreds? For a large enterprise the number is likely to be closer to a million or more. And what access those keys enable, where and to whom? Each of those keys can be a potential security risk or compliance violation. And can you be sure that revoking this particular key won’t disrupt a critical business process somewhere?
This KuppingerCole Webinar covers the following topics:
- The range of applications of the SSH protocol in modern IT;
- The fundamental difference between SSH and Enterprise PKI;
- Security risks and compliance challenges related to unmanaged SSH infrastructures;
- Automation as the crucial component of SSH management;
In the first part of this webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will present an overview of the security and compliance risks of unmanaged SSH keys and demonstrate how severely underestimated this problem is in many organizations.
In the second part, Kalle Jääskeläinen, Vice-president for Enterprise Key Management at SSH Communications Security, will present a solution to this challenge, which combines discovery, monitoring and automated management of SSH infrastructures across multiple platforms.
SSH.COM is one of the most trusted cyber security mavericks. We foster a culture of innovation and purpose-driven engineering to secure access to the digital core.
Since inventing the SSH protocol in 1995, we’ve been safeguarding the digital economy. 3000+ security-aware customers, ranging from “digital-borns” to the world´s largest banks & fortune 500 enterprises, trust our expertise.
Our product promise is built-on the principles of zero-inertia, zero-friction and zero-credential risk.
The Identity-as-a-Service (IDaaS) market continues to develop with a significant push from organizations looking to adopt cloud-based delivery of security services including IAM. While IDaaS Access Management solutions, providing SSO (Single Sign-On) for the users and access to a variety of services are already established, IDaaS IGA is not as widely used yet. However, shifting IGA (Identity Governance and Administration) capabilities, e.g. Identity Lifecycle Management and Access Governance, to the cloud might provide significant benefits regarding time and cost of deploying and operating IGA.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.