Solution
Omnigate
Access control and audit solution
Omnigate
It is a remote access control system that enhances the security of information system management by tracking the activities of users and the commands used for shared accounts, and by recording all work details to provide evidence for post-audit materials.
Main functions
-
Session/User log
- Streamlined system access paths
- User authentication is managed through the server access control system, which controls access permissions for remote connections such as Telnet, SSH, FTP, SFTP, and RDP
-
Command Control
- Providing encrypted communication channels to prevent information leaks through user access paths
- Offering command blocking features to prevent system errors and downtime caused by user mistakes
-
Access control
- User's command execution history
- Logging and storing work details as audit logs to support post-audit in case of failures or security incidents.
-
Reports
- Viewing all work details and commands
- Filtering and searching work logs and command history
- Support for generating and exporting compliance reports using the CLIP Report Bundle
Configuration diagram

Key Advantages
-
Convenience
- Tracking of activities performed under shared user accounts and integrated management of remote access users.
- Access control based on user permissions with automated management of permission expiration.
-
Security
- Storing logging of all activities from remote user login to logout.
- 100% replay and record-keeping of work history, even for tasks performed in emulators such as vi and emacs.
-
Stability
- Providing a unified access path using a proxy-gateway method
- Enhancing security and safety through secure channel configuration
- Supporting complex redundancy with up to 12 gateways
Expected effects
-
Stability enhancement
- Strengthening system stability by reinforcing control over system access for authorized internal and external users
- Access control for external employees and vendor staff
-
Work efficiency increase
- Recording all actions of system remote access users to quickly respond to and identify the causes of failures or security incidents.
-
Improvement of reliability
- Security enhancement by controlling unnecessary access to the system
- Preparation against human error of system users