Docs
uhas
Product Introduction
Use Cases

Use Cases

1. Difficult to control shared accounts

When the number of company employees, departments, and hosts is large, and situation such as the handover of business between different departments, staff department changes, or staff departures occur frequently, these all lead to the decentralized difficulty of operation permissions.

If problems occur with the use of shared accounts, it will be difficult to hold specific individuals accountable afterwards.

Account (account management) can provide employee account + host account management functions, easily dividing departments and groups, and permissions allocation, changes and cancellation can be easily completed!

2. Device passwords are hard to manage

Company employees follow their own habits and use multiple protocols such as SSH, VNC, and Telnet. It is difficult for administrators to set unified authentication and hard to locate when problems arise. After the emergence of security vulnerabilities in various operation and maintenance tools such as SecureCRT, Xshell, etc., it is hard to ensure that everyone completes upgrading the defenses on time.

Authentication (authentication management) uses the flagship version of the fortress machine as a secure unified authentication entrance for centralized management. Employees can still maintain their own operating habits and apply commonly used protocols with their original operation and maintenance tools.

3. Operation behavior is hard to regulate

The company’s outsourced personnel, for the convenience of work, need to open a series of permissions, but the opened permissions cannot be limited and regulated.

UHAS's Authorization (permission management) assigns sufficient operation and maintenance permissions to outsourced personnel. The company assigns administrators and auditors to supervise the permissions of outsourced developers and conduct audits on their operations. Easy management!

4. The operation process is not transparent

The login and operation of the company’s important business system and the operation process of the outsourced team hired are not transparent. For enterprises, high-risk operations cannot be regulated. Once the system is deleted or a backdoor installed, it will strike a fatal blow to the enterprise. For operation and maintenance personnel, when a security accident occurs, they cannot prove their innocence and they cannot locate the source.

Audit (audit management) Administrators can monitor the operations of operation and maintenance personnel in real time and stop them in time. All operations that pass through the fortress machine can be audited, and audit records cannot be tampered with.