Network Device Privilege Management

The current security landscape requires organizations to have granular control and detailed auditing of activities that occur on networks. Some network devices – like routers, switches, and firewalls – present a challenge to using traditional agent based solutions to provide the level of auditing and control desired. These devices provide critical functions and are often-overlooked targets for external attackers and malicious insiders. When managing a heterogenous network of devices it is difficult to find a single solution to provide a consistent level of policy controls and auditing of your infrastructure. Best practices recommend that passwords to these devices are securely stored and regularly changed, but enterprise password management addresses only part of the problem.

  • What happens after the user logs on to the device?
  • Can you control what commands are being run?
  • Can the session be recorded?
  • Can active sessions be viewed, paused and terminated?
  • Is audit data centralized and indexed?