Use Cases
1. Difficult to control shared accounts
When the number of company employees, departments, and hosts is large, and situation such as the handover of business between different departments, staff department changes, or staff departures occur frequently, these all lead to the decentralized difficulty of operation permissions.
If problems occur with the use of shared accounts, it will be difficult to hold specific individuals accountable afterwards.
2. Device passwords are hard to manage
Company employees follow their own habits and use multiple protocols such as SSH, VNC, and Telnet. It is difficult for administrators to set unified authentication and hard to locate when problems arise. After the emergence of security vulnerabilities in various operation and maintenance tools such as SecureCRT, Xshell, etc., it is hard to ensure that everyone completes upgrading the defenses on time.
3. Operation behavior is hard to regulate
The company’s outsourced personnel, for the convenience of work, need to open a series of permissions, but the opened permissions cannot be limited and regulated.
4. The operation process is not transparent
The login and operation of the company’s important business system and the operation process of the outsourced team hired are not transparent. For enterprises, high-risk operations cannot be regulated. Once the system is deleted or a backdoor installed, it will strike a fatal blow to the enterprise. For operation and maintenance personnel, when a security accident occurs, they cannot prove their innocence and they cannot locate the source.