SIMPLIFY THE 
WORKFLOW FOR SECURING REMOTE SERVER ACESSS

SaaS BASTION LOCKS DOWN YOUR CLOUD ENVIRONMENTS

01 / SECURITY

80% of data breaches involve compromised credentials.  And the average cost of a data breach is $3.6M plus an additional 5% drop in share price. 

SaaS Bastion protects against breaches by securely storing your server credentials while controlling, monitoring and logging your users' shell access to your servers.

With Saas Bastion, users SSO into your targets. No more SSH keys.

02 / VISIBILITY

Basic cybersecurity hygiene and modern compliance frameworks demand that you track and control each remote server access made by your operators, your developers and their scripts.   

Our SaaS Bastion immutably logs sessions and commands before they reach the server. This way, an adversary can't hide their actions by deleting logs on the server.

03 / CONTROL

SaaS Bastion uses the applies policy to determine which users or groups can access which target servers or cloud environments. 

Set time-based policies to give users just-in-time access, or require users to get authorization from a manager before accessing a sensitive environment.  Implement your zero-trust access polices via a Policy as Code from, or by using our simple web-based GUI.

SaaS BASTION ARCHITECTURE

 
 

SIMPLIFY ZERO-TRUST SECURITY
 

AUTODISCOVER YOUR TARGETS
GET YOUR VPN
OUT OF THE WAY
NO NEED TO RUN 
INFRASTRUCTURE

SSH keys are a pain to manage.

Standing SSH credentials also mean that you can't easilty limit, timebox or revoke your users' access to sensitive targets.

 

WIth SaaS Bastion, you no longer need to manage SSH keys . Instead, by installing our open-source agent on your targets, your targets will autodiscover and register themselves to the Bastion without any manual configuration.

VPNs can be costly, difficult to maintain, and can slow your users down.

 

With SaaS Bastion, you can eliminate your VPNs by installing our optional open-source agent on your targets.  The agent phones home to a whitelisted address on SaaS Bastion when the target spins up; this way, the target can connect to the SaaS Bastion, even without a VPN.

 

The target is locked down because the agent does not accept incoming connections, nor does it connect anywhere other than the whitelisted SaaS Bastion address.

SaaS Bastion is a SaaS, which means you never need to provision, upgrade, patch, or maintain it.  

 

The SaaS Bastion leverages your Identify Provider to provide Single Sign On (SSO) to all of your targets, whether on-prem, or in the public cloud.  No more managing IAM controls in multiple clouds.


Also, you haven't given us all the keys to your kingdom, because our next-generation zero-trust security model ensures that the Bastion cannot access a target without the participation of a user from your organization.

 

HOW IT WORKS

(1)

USER SSOs
INTO BASTION
(2)

USER REQUESTS
ACCESS TO
TARGET
(3)

BASTION APPLIES POLICY CHECK
TO REQUEST
(4)

BASTION DENIES
OR GRANTS
ACCESS
(5)

USER'S COMMAND'S
TO TARGET ARE
LOGGED BY
BASTION

SIGN UP FOR EARLY ACCESS

 
LINKS
ABOUT

Commonwealth Crypto, Inc.
45 School St, Floor 2

Boston, MA, US 02108

info@commonwealthcrypto.com

SOCIAL
  • LinkedIn
  • Twitter

© 2020 by Commonwealth Crypto, Inc.