{"id":273516,"date":"2020-09-14T15:08:27","date_gmt":"2020-09-14T19:08:27","guid":{"rendered":"https:\/\/insidebitcoins.com\/?p=273516"},"modified":"2021-08-05T13:49:22","modified_gmt":"2021-08-05T17:49:22","slug":"keyfactor-releases-ssh-key-manager-for-increased-security-on-its-platforms","status":"publish","type":"post","link":"https:\/\/insidebitcoins.com\/news\/keyfactor-releases-ssh-key-manager-for-increased-security-on-its-platforms","title":{"rendered":"Keyfactor Releases SSH Key Manager for Increased Security on Its Platforms"},"content":{"rendered":"
Keyfactor, a self-described platform that “empowers enterprises of all sizes to close their critical trust gap \u2013 when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line,” has revealed its release of an SSH Key Manager for Keyfactor Command. This essentially means that its platform can automate the distribution of Secure Shell keys across businesses in the organization, according to a press release from the group<\/a>.<\/p>\n SSH keys are essential, as they ensure users can access important databases and software in a secure way, the release continues. That said, organizations who fail to treat these keys with the proper level of security may find their information being stolen. Keyfactor’s new management process is meant to protect against that.<\/p>\n Speaking on the matter is Ted Shorter, the CTO and co-founder at Keyfactor, who said:<\/p>\n \u201cUnlike other kinds of access credentials, SSH keys don\u2019t expire. Between servers and cloud workloads, organizations can have upwards of a million SSH keys. Tracking all active and abandoned SSH keys makes manual management next to impossible. As a result, we\u2019ve seen an uptick in attacks using SSH keys as an access point to critical systems, applications and sensitive data.\u201d<\/p><\/blockquote>\n This release details the following benefits provided by SSH Key Manager:<\/p>\n – Reduced risk exposure \u2013 maintaining a real-time inventory of SSH keys and the ability to delete or rotate weak or inactive keys.
\n– Complete visibility \u2013 allowing teams to find SSH keys and map trust relationships to users, machines and web services, whether on-premises or in the cloud.
\n– Greater control \u2013 providing a simple dashboard to identify risks, assign key permissions and simplify audits with easy-to-generate reports.
\n– Seamless automation \u2013 automating SSH key deployment as workloads are spun up in multi-cloud and CI\/CD environments.<\/p>\n","protected":false},"excerpt":{"rendered":"