IT Admins, DevOps and development teams struggle with managing and protecting access to infrastructure in the cloud and on-prem to endpoints like remote desktops, Windows machines, Linux Servers, Kubernetes clusters and Databases.
Typically, what we see happening in companies is that privileged passwords, SSH keys and cloud access keys for connecting to infrastructure are usually just shared among team members and then they end up getting stored all over the place in 3rd party connection tools like Microsoft Remote Desktop or SSH clients. You end up with passwords or SSH keys stored on local workstations or 3rd party software that potentially have keys to the kingdom. As you scale, the control and rotation of these access keys becomes a big problem and ends up causing confusion, wasted time and potential security issues.
With the shift to remote work and the push towards Zero Trust, organizations of all sizes need more secure ways to manage access to infrastructure without having to explicitly share passwords and SSH keys.
Glyptodon, by Keeper, is a Zero-Knowledge and Zero-Trust platform that provides secure and effortless access to your infrastructure and desktops from any device. Glyptodon is an agentless remote desktop gateway that can be installed in any on-premise or cloud environment.
Glyptodon was built by the original creators of Apache Guacamole, a widely used open source remote access gateway with millions of installs. Guacamole's proven technology and active development community provides customers with a high level of trust.
Here's how it works. Glyptodon is installed into your environment as either a docker container or installed as a service on any CentOS or Red Hat Enterprise Linux machine. The platform is 100% agentless and browser-based, which means that you don't need to install anything on your endpoints or target systems. Access can be controlled through many different methods including SSO, Active Directory, password, MFA, firewall rules and client certificates.
To access a remote system, The end-user accesses their desktops through a web browser which makes it accessible from any computer, tablet or mobile device.
For privileged sessions, the platform allows you to set up remote sessions for users without exposing the credentials to the user. Session videos and keystrokes can be recorded for auditing purposes, and there's a ton of flexibility in how you can configure the remote sessions. You can even share sessions between multiple users, providing many flexible use cases and workflows.
In the simplest use case, you can replace your existing VPN and legacy remote desktop tools. Users just login to Glyptodon and then instantly access their desktops with one click. It's all through a web browser so the user experience is super simple. The remote session is very fast and responsive.
Desktop access works with RDP or VNC protocols, so it's compatible with any type of Windows, Mac or Linux system.
For terminal-based sessions, the SSH experience is just as simple and responsive.
The SSH connection type behaves just as if you were sitting on the physical machine.
As you can see, the user doesn't need to know the credentials to login to the remote system. It's completely managed by the platform.
You can switch between multiple active connections by clicking on the thumbnail here. Switching between desktops is instant.
You can tile multiple connections in the same window. I'll open 4 different SSH connections to different servers just by multi-selecting them here.
I can even execute the same terminal commands in all of the systems at once.
Connections can be shared among team members. This is helpful in situations where you need to collaborate on the same session, or if you just need to monitor usage. You can join existing sessions from the "Active Sessions" screen....
Or, you can share your session with an outside user, such as a contractor, with a Share link.
Login sessions can be recorded, audited and played back by the administrator. Video of every mouse movement, keystroke and user interaction is captured for auditing purposes.
For privileged sessions, Glyptodon integrates seamlessly with Keeper Secrets Manager. This allows the Admin to manage and protect the privileged account credentials in the Keeper Vault, and carve out specific records and folders that Glyptodon can access. When a user is granted access to a remote session, the credentials are never exposed to the user. That's managed between Glyptodon and the Keeper Vault.
To speak to a Keeper solutions engineer or start a trial of Glyptodon, visit keeper.io/contact