Technology leading privileged session management

“Compare mixed offerings from multiple vendors against comprehensive suites. Adding third party capabilities such as privileged session management (PSM) can sometimes offer a more suitable solution at a lower price than a suite offering."

Gartner, Market Guide for Privileged Access Management, Felix Gaehtgens, Anmol Singh, 27 May 2015
Request a callback

Granular Access Control

SCB acts as an application level proxy gateway. The transferred connections and traffic are inspected on the application level (Layer 7 in the OSI model), rejecting all traffic violating the protocol – an effective shield against attacks. This high-level understanding of the traffic gives control over the various features of the protocols, like authentication and encryption methods used in SSH connections, or channels permitted in RDP traffic.

  • Support for SSH, RDP, HTTP(s), Citrix ICA, Telnet, TN3270/TN5250, VNC, X11 and VMware View protocols
  • Control protocol specific channels, such as terminal sessions, disk-mapping or file sharing
  • Audit SCP, SFTP and HTTP(s) based file transfers
  • Detailed access control based on time and user group policies
privileged session management
privileged activity manager

Strong Authentication and Authorization

SCB can enforce the use of two-factor authentication methods and also verify the public key of the users. SCB has a built-in capability to verify the SSH host keys and certificates identifying the servers, preventing man-in-the-middle attacks and other threats. This authentication is completely independent from the authentication that the user performs on the remote server. To avoid accidental misconfiguration and other human errors, SCB supports the 4-eyes authorization principle as well.

  • Gateway authentication
  • Integration with authentication databases (for example, Microsoft AD, LDAP or RADIUS) and multifactor authentication backends
  • User-mapping policies – describe who can use a shared user (e.g. "root") to access the remote server
  • Password vaulting – use the built-in Credential Store, or integrate with a third-party password management system
  • Server-side auto-login with SCB impersonating the authenticated user on the server
  • "4 eyes" authorization – the authorizer can allow, track, and even terminate the administrator’s access to the server

High Quality session recording

SCB operates transparently and extracts information directly from the communication of the client and the server, providing reliable access data. SCB records user sessions into searchable audit trails, making it easy to find relevant information in forensics or troubleshooting situations. Audit trails can be browsed online, or followed real-time to monitor the activities of the privileged users. The multiplatform Audit Player application replays the recorded sessions just like a movie – all actions of the administrators can be seen exactly as they appeared on their monitors. The Audit Player enables fast forwarding during replays, searching for events (for example, mouse clicks, pressing Enter) and text seen by the user.

  • Complete documentation about ALL remote system access
  • Tamper-proof (encrypted, signed and time-stamped) audit trails
  • Movie-like playback of recorded sessions
  • Fast, free-text search in sessions
  • Custom activity and compliance reports
High Quality session recording for incident management

Joe's One Day (Incident management)

Real-time detection & prevention

Joe's One Day 2. - Joe at an outsourcing company (Real-time detection & prevention)

Real-time Alerting and Blocking

SCB can monitor traffic in real time, and execute various actions if a certain, predefined pattern appears in the command line or on the screen. In the case of detecting a suspicious user action (e.g. a destructive command or an unwanted windows application), SCB can perform the following measures:

  • Send an e-mail or SNMP alerts about the event
  • Immediately terminate the connection
  • Log the event in the system logs
  • Store the event in the connection database of SCB

Easy-to-use GUI

SCB is configured from a clean, intuitive web interface. The roles of each SCB administrator can be clearly defined using a set of privileges – management of SCB as a host, management of connections to servers, viewing audit trails and reports, and so on.

  • Granular access control to SCB GUI
  • Ergonomic, web-based search interface
privileged session management UI
privileged session monitoring

seamless Integration into security ecosystem

To ensure integration into your network infrastructure is seamless, SCB is available both as a physical or virtual appliance and automatically handles transparent and nontransparent connections. It can be seamlessly integrated with password managementticketing systems, SIEM and system management tools. To simplify integration with firewalled environments, SCB supports both source and destination address translation (SNAT and DNAT).

“The [Balabit] solution’s strongest points are the privileged session management, recording and search, and applying policy filters to apps and commands typed by administrators on monitored sessions."

The Forrester Wave, Privileged Identity Management, Q3 2016, by Andras Cser