Discover SSH servers and keys.

Ensure compliance with industry standards and regulations.

With cyber threats increasing by the day, IT organizations need to adhere to stringent security controls prescribed by governments. While ensuring compliance with these regulations, organizations have to face IT audits and demonstrate compliance in the form of reports as well.

When it comes to SSH key management, almost all industry and government regulations—including NIST guidelines, PCI-DSS, SOX, HIPAA, FISMA, GLBA, NERC-CIP, COBIT, and others—mandate the following:

  • Centralized key management.
  • Continuous tracking of trust relationships (users to keys to servers).
  • Periodically changing keys and enforcing strong passphrases.
  • Tracking who has access to what systems and maintaining an inventory of keys.
  • Identifying and deleting unused keys.
  • Promptly deleting keys when users leave the organization.
  • Auditing and recording all user activities and maintaining those trails.

Organizations need an automated mechanism to enforce policies, ensure regulation compliance, and generate reports. Key Manager Plus gives you exactly that.