Session Recording and Monitoring

Monitor and Control Privileged Sessions Across Cloud and On-Premises

Detect suspicious user activity to alert in real time of attacks that may be in progress. Monitor and control privileged sessions that leverage shared accounts and individual accounts with full video and metadata capture.

Session Recording, IT User Session Recording, IT Software session recording

Thwart Attacks and Gain Granular Visibility into Privileged Activity


Monitor privileged sessions across on-premises and cloud-based infrastructure


Establish accountability by associating privileged activity with an individual


Identify abuse of privilege with high-fidelity recordings of sessions and indexed session metadata


Ensure session recording cannot be bypassed with host-based auditing


Shell-level and process-level monitoring for high-risk systems that is virtually impossible to spoof

Gateway and Host-based Session Auditing and Video Capture

Capture and collect data in a high-fidelity recording of each privileged session on any server or network device across your on-premises and cloud-based infrastructure. Stores sessions in an easily searchable SQL Server database for a holistic view of exactly what happened on any system, by any or all users, and at any given time.

Learn More
privileged session manager, privileged user monitoring

Monitor and Terminate Suspicious Activity in Real-time

Gain new levels of oversight for privileged sessions on critical infrastructure. Administrative users watch activity in remote sessions in real-time and can instantly terminate suspicious sessions through the Centrify Admin portal.

monitor it session suspicious activity in real time

Prevent Spoofed or Bypassed Access with Advanced Monitoring

Discover rogue activity such as the creation and storage of SSH key pairs that would make it easy to bypass security controls, and attribute activity to the individual user. Audit all SSH session activity at the process level in forensic detail for security review, corrective action and compliance reporting.

Learn More

Easy Integration with SIEM, Alerting and Reporting Tools

Privileged access data is captured and stored to enable robust querying by log management tools and integration with external reporting tools. Streamlined integration with SIEM and alerting tools such as HP ArcSight, IBM QRadar and Splunk identify risks or suspicious activity quickly.

Splunk SIEM alerting and reporting tools

Indexed and Searchable Database of Session Activity

Record all privileged sessions and metadata, attributing activity to an individual to deliver a comprehensive picture of intentions and outcomes. Searchable playback feature gives IT security managers and auditors the ability to see exactly what users did, and identify abuse of privilege or the source of a security incident.

Learn More
IT Session activity database, session recording database


Centrify Advanced Monitoring - Detect Malicious Activity in Scripts.


In this second video in a series exploring Centrify’s advanced monitoring, learn how to stop a breach in progress and ensure individual accountability with full actionable context when an attacker or malicious insider attempts to obfuscate their intentions by hiding privileged activity inside a script file.