version-new

Ezeelogin-Blog

shape
shape
shape
shape
shape
shape
shape
shape
Standard

How to Record Linux Terminal/SSH Sessions?

  • November 30, 2022

What’s the Purpose of Recording SSH Sessions? After the covid 19 pandemic, there are a lot of system administrators working from home and usingremote software for managing and configuring servers remotely. Most system administratorschoose the SSH protocol for remote administration and management of Linux-based servers. Inthe enterprise environment, a lot of users are working on

Standard

Tutorial on SSH Agent

  • August 11, 2022

What is an SSH Agent? The SSH agent is a key manager for SSH service, which allow us to authenticate remote Linux system interactively. It stores the user’s SSH key and passphrases in process memory. It is one type of single sign-on (SSO). It uses stored SSH keys and passphrases to authenticate to the remote

Standard

SSH Key-based Authentication on Linux Servers

  • May 09, 2022

Secure Shell or SSH is a network protocol that helps the users, mainly system administrators to securely access the remote computer over an unsecured network. SSH is the current de-facto method of remote server administration. Before SSH, telnet and rlogin were the primary tools for remote administration. SSH was a game-changer in the computing industry.

Standard

How to Harden SSH Server?

  • March 29, 2022

Introduction Secure or harden the SSH server has become a very important security concern as it acts as the entry point or gateway to remote servers. SSH protocol is widely used by the system administrators to manage the linux servers remotely. By default, port 22 is used for SSH. In this blog post, we will

Standard

SSH Bastion Host

  In recent times, there is an increasing need for organizations to give employees access to their IT facilities due to the ongoing Covid restrictions ( such as work from home )  in place and in other cases grant access to external parties like clients, vendors who want to troubleshoot and fix issues with the

Standard

SSH Jump Host

Introduction      In recent times, there is an increasing need for organizations to give employees access to their IT facilities due to the ongoing Covid restrictions ( such as work from home )  in place and in other cases grant access to external parties like clients, vendors who wants to troubleshoot and fix issues

Standard

Interview With Safety Detective on the future of Cybersecurity.

Interview with Safety Detective on Cybersecurity. Bachchan James, Director and Founder here at Ezeelogin, was interviewed by Safety Detective. They talked about how Ezeelogin got started, the biggest cybersecurity threats facing enterprises today, and the impact COVID-19 is having on the cybersecurity industry. “Any business that has a couple of servers or looking to meet

Standard

Ezeelogin Jump Server Conferred 2 IT Management Software Badges by Popular Platform for Software Reviews

FinancesOnline, one of the most popular independent review platforms for business software solutions, has recently recognized Ezeelogin Jump Server with two industry recognitions: Premium Usability and Rising Star awards for 2019. These awards were given after their software experts evaluated the top players under its IT security software space. Recording a 100% user satisfaction rating,

Standard

rdp session recording

Record RDP Session You can record rdp session performed via the browser tab. Recording rdp session for your staff or employees accessing your windows servers via rdp is mandatory to meet various security compliances such as pci dss, hippa, FFIEC, SOX, SOC, NIST, NERC, ISO 27001, GDPR and more. A responsible company would record all

Standard

SSH Jump Host with Yubikey ssh two factor authentication

SSH Yubikey based two factor  authentication is integrated into ezeelogin ssh jump host for extra security. Even if someone steals your username and password (which is on the increase) they cannot access your jump host without your physical key. The YubiKey generates an encrypted password that can only be used once. Hackers require physical access of your

Features

Others