Machine Identity Network Explorer (MINEr)

MINEr allows users to intuitively visualize and analyze key relationships amongst the security entities spanning machines within an organisation. It makes sense of complex scenarios hiding amongst relationships including SSH based pivot paths.
Business Outcomes
  • Easily visualize ALL SSH machine identities in your organization

  • Advanced, in-depth analysis of potential SSH threats in your network

Integration Features
  • Basic visualization and guided ad-hoc exploration of the machine identity network space

  • Ability to identify and visualize potential pivot paths through a network

  • Detect groups, clusters or partitions of entities within a network, as well as potential anomalies

Solution Overview

With MINEr you can intuitively visualize and analyze key relationships amongst the security entities spanning the machines within an organization. Core information and events are extracted via the Venafi API, with an initial focus on SSH. This is transformed into a graph native format which then enables further advanced in-depth analysis and insight. Key features include making sense of complex connected data, such as identifying pivot paths and lateral movement scenarios.