
Cybersecurity for SFTP, SSH, and RDP connections
10 de January de 2025
By 2030, the Number of Connected IoT Devices Will Exceed 30 Billion.
23 de January de 2025In a world where cybersecurity is constantly evolving, the legacy of insecure protocols such as HTTP, FTP, TELNET, or those used in IoT and industrial environments has become a latent threat. The lack of encryption, robust authentication, and precise access controls in these protocols makes them vulnerable points for attacks like “man-in-the-middle,” credential theft, and sabotage of critical infrastructures.
This is where Endurance, Cosmikal’s comprehensive solution (featuring PAM, VDI, DLP, and shielded remote desktop functionalities), makes a difference.
In this article, we will detail how it is possible to secure these connections efficiently and seamlessly, ensuring protection without interrupting operations or impacting business performance.
The problem: Insecure protocols and their impact
Many legacy systems and modern devices in sectors such as telecommunications, energy, or industry rely on outdated protocols or are designed without current security controls in mind. These include:
- HTTP: Transfers data in plain text, making it susceptible to interception.
- FTP: Lacks encryption for file transfers, exposing sensitive data.
- TELNET: Transmits credentials and commands without protection, leaving it vulnerable to sniffing.
- IoT and industrial protocols: Designed for functionality rather than security, they are frequent targets of cyberattacks.
In this scenario, ensuring that these systems remain operational without compromising security is a critical challenge.
Advanced protection
Endurance redefines security by transforming insecure connections into shielded, isolated environments, acting as an intermediary between users and systems. How does it achieve this? Through several key functionalities:
1. Secure connection broker
Instead of connecting directly through the insecure protocol, the user connects to Endurance, a shield environment that encapsulates, protects, and monitors the communication.
- End-to-End Encryption: The connection between the user and Endurance (image, audio, keyboard and mouse events, etc.) is encrypted.
- Session Isolation: Through this encrypted connection, the user utilizes Endurance’s shielded remote desktop, and only Endurance establishes connections with the assets. This way, even when dealing with insecure connections, they cannot be intercepted by a third party.
2. Encrypted Vault for credentials
The credentials required to access both devices and systems are stored and managed in an encrypted vault, which is also fully isolated. Users do not interact directly with these credentials, eliminating the risk of exposure.
- Automatic Key Rotation: Enables periodic password changes without manual intervention, ensuring they are always unique and up-to-date. This mitigates the risk of unauthorized access due to compromised or outdated passwords.
- Multi-Factor Authentication (MFA): Makes it difficult for malicious actors to gain access even if they obtain valid credentials. It is an essential measure to protect critical systems against phishing or brute-force attacks.
3. Detailed monitoring and logging
Endurance captures every action performed during a session, providing:
- Session Recordings: For audits and regulatory compliance.
- Real-Time Alerts: Detects anomalous activities and intervenes automatically to notify and help stop threats.
4. Compatibility with legacy systems
Through customized integrations, Endurance enables legacy systems to benefit from modern multi-layered security without the need for costly updates or service disruptions.
5. Granular access control
It defines which users can access, when, and to which specific resources, establishing restrictions based on the operational needs of each company.
Use cases
1. Securing surveillance infrastructures
An energy company has IP cameras to monitor its facilities. However, many of them are old and use HTTP connections. By deploying Endurance, all connections would be routed through the Shielded Remote Desktop, eliminating the risks of using insecure connections and protecting the information.
2. Protection of IoT devices in telecommunications
A telecommunications provider faces security issues with IoT devices that use HTTP to communicate. By integrating Endurance into their systems, these connections are encrypted end-to-end and monitored, ensuring data integrity and traceability without interrupting operations.
Advantages of Endurance
By placing a shielded workspace between users and assets, the network architecture is simplified, and access control and credential management are centralized in one location.
- Eliminates direct access: Mitigates risks even if someone has gained access to the infrastructure or when facing an insider threat.
- Adapts to complex environments: Unifies the protection of modern devices and legacy systems within a single, efficient security framework.
Conclusion
Endurance not only protects insecure connections, but its ability to integrate, encrypt, and monitor both obsolete and modern protocols makes it the ideal solution for companies seeking a balance between operational efficiency and security. With Endurance, secure connections are a reality.