INNOVEXUS
Solution · Cisco Session Recording

Session recording for Cisco devices.Every session captured. Every keystroke attributable.

IOS, NX-OS, IOS-XR — SSH, console, and Telnet sessions to your Cisco fleet recorded in full. Searchable playback. Cryptographically signed audit trail. Attribution rooted in FIDO2 hardware authentication. Designed for NOC, SOC, and compliance teams that need real evidence, not log fragments.

§ 01 / The problem

Cisco PAM gaps that audits actually find.

Network engineers SSH into routers, switches, and firewalls every day. Most organisations have one of three audit answers when the auditor asks "show me what happened in this session": no recording at all, a TACACS+ command log that's missing context, or a Wireshark-style capture nobody can search. None of those pass a SOC 2 or NERC CIP audit on the first review.

/ 01

TACACS+ logs are command-level, not session-level.

A TACACS+ accounting record tells you "user X executed `show running-config`." It does not tell you what the device replied, what config was actually pasted in, or what the engineer saw on screen. For a real incident review, command-level logs are insufficient evidence.

/ 02

Shared admin credentials kill attribution.

When everyone logs into a Cisco device as `admin` or `cisco`, the audit log shows the username but not the human. Attribution fails the moment more than one engineer has the password — which, in practice, is always.

/ 03

Console access bypasses everything.

A laptop on a console cable into a Catalyst switch leaves zero remote audit trail. Network operators bypass logging the moment something goes wrong because the SSH path is broken or too slow. Auditors ask: "Prove this session was attributable." There is no answer.

/ 04

Searching old sessions takes hours.

Even where session recording exists, retrieving "every session that touched VLAN 200 last quarter" is typically a manual scrape across multiple log servers, console-server flat files, and TACACS+ exports. Auditors set 5-day evidence deadlines. Manual scraping does not meet them.

§ 02 / How Innovexus solves it

How Innovexus records every Cisco session.

Innovexus brokers every connection to your Cisco devices through a per-tenant pod. The session is recorded the moment it opens and closed the moment it ends — no agent on the device, no Cisco-side configuration changes beyond pointing AAA at our pod or vaulting the local credential. Attribution is hardware-rooted: every session ties back to the specific FIDO2 hardware key that authenticated.

/ 01

Full session video with searchable text

Every keystroke and every device response is captured as a frame-perfect terminal recording. The full session text is indexed for search — you can find "every session that ran `write erase`" across the whole fleet in seconds.

/ 02

Hardware-rooted attribution

Sessions are tied to the FIDO2 hardware key that authenticated, not just a username. If you allow shared-key login at the device level, the human attribution at the Innovexus pod still holds — you can prove which physical hardware key initiated the session.

/ 03

Works with IOS, NX-OS, IOS-XR, and console

No agent installs on the device. The session broker speaks SSH, Telnet (over a secured channel), and serial-over-IP via Innovexus-attached console servers. Catalyst, Nexus, ASR, ISR, IE switches, ASA, and FTD firewalls all supported out of the box.

/ 04

Cryptographically signed audit log

Every session record is signed by the per-tenant pod's key at creation. Tampering breaks the signature, which means the audit trail is provably intact for compliance review. Signed records export cleanly to a SIEM or to a long-term WORM store.

/ 05

Real-time playback

Senior engineers can spectate active sessions in real time for training, change-window oversight, or incident response. Playback streams via the same web console — no separate tools.

/ 06

Compliance-ready exports

Pre-built exports for SOC 2 (CC6.1, CC6.6, CC7.2), NERC CIP-007-6 R5 (system access controls), ISO 27001 A.9, and PCI DSS 10.2. One click produces an auditor-ready bundle for a date range, device list, or user.

§ 03 / How it works in practice

Setup, in plain language.

Most teams have session recording running across their Cisco fleet within one business day of starting the trial. Here's the actual sequence.

  1. 01

    Provision the per-tenant pod

    Sign up for a 5-day trial and a dedicated Innovexus pod provisions in your chosen region. The pod's outbound IP is allowlisted on your Cisco devices for SSH; the pod is the only source allowed to connect.

  2. 02

    Vault device credentials

    Existing local admin credentials, TACACS+ shared keys, or RADIUS secrets are imported into the AES-256 vault. The vault is the only place those credentials live going forward — engineers never see them again.

  3. 03

    Connect identity provider

    SAML or OIDC integration with Okta, Azure AD, or any IdP your org uses. SCIM provisioning syncs users and groups. FIDO2 hardware keys (YubiKey or equivalent) are enrolled at the platform login, not at the device.

  4. 04

    Engineers connect through the pod

    Engineers log into Innovexus with their hardware key, see the devices their role permits, and click into a session. The pod opens an SSH connection to the device using the vaulted credential. Recording starts at session open.

  5. 05

    Audit on demand

    Compliance auditors get a read-only role that lets them search recorded sessions, replay any session, and export evidence bundles. No engineer involvement required for routine audit fieldwork.

§ 04 / Other approaches, honestly

How this compares to other approaches.

There are several ways to get session evidence on Cisco devices. Each has tradeoffs. The honest version of where Innovexus sits.

TACACS+ accounting only
Cheap, insufficient

Cisco ISE or open-source TACACS+ logs every command but not the device output. Suitable for "what command did this user run" but not for "what did the engineer actually see and change." Most auditors flag this as inadequate session evidence on the first review.

Console-server flat files
Brittle, unsearchable

Opengear, Lantronix, and similar console servers can log to flat files. Storage management, retention, and search are all manual. Attribution is a username field, not hardware-rooted. Works for forensics if you already know what session to look at.

CyberArk PSM for Cisco
Capable, expensive

CyberArk's Privileged Session Manager records sessions to network devices with full video and search. Capability parity with Innovexus is real for the recording feature itself. Cost is materially higher (CyberArk PSM is typically $30K+/yr starting); deployment is partner-led and runs 6–12 weeks.

DIY: tee + script + S3
Works at small scale

A jump host with `script` recording every session, uploaded to S3 nightly, has worked for small teams forever. Falls apart at fleet sizes above ~50 devices, lacks attribution beyond the jump host login, and produces no compliance-ready exports.

Solution · Cisco Session Recording · FAQ

Common questions

Direct answers — written so each passage stands alone for AI-engine citation.

01

Does Innovexus require an agent on Cisco devices?

No. Innovexus is agentless from the device perspective. The per-tenant pod brokers SSH, Telnet, and serial-over-IP connections; the device sees a normal management connection from the pod's allowlisted IP. There is no software to install on IOS, NX-OS, or IOS-XR. This matters because most network operators cannot install third-party agents on production Cisco gear without vendor support implications.

02

How does Innovexus session recording compare to Cisco ISE accounting?

Cisco ISE TACACS+ accounting logs commands the engineer typed; Innovexus records the full session including every byte the device sent back. ISE is a great identity-and-access tool but accounting is command-level, not session-level. For an audit question like "what did the engineer see when they ran the diagnostic" or "what config did they paste in" — only full session recording answers it. Innovexus and ISE are typically deployed together: ISE for AAA at the device level, Innovexus for full session evidence.

03

Can Innovexus record console (out-of-band) sessions to a Cisco device?

Yes, when the console is reached through an Innovexus-attached console server (Opengear, Lantronix, Cisco TS, or any serial-over-IP gateway). Engineers connect to the console via the per-tenant pod the same way they connect to SSH; the recording captures the full serial session. Direct laptop-on-cable console access cannot be recorded by any remote tool — that's a physical access control problem, not a recording problem.

04

How long are recordings retained?

Default retention is 90 days for full-fidelity session video and 7 years for the cryptographically signed audit metadata (timestamps, user identity, device, command-level events). Both retention periods are configurable per compliance requirement. Full-session video can be exported to a customer-managed S3-compatible store for indefinite retention if SOC 2 or NERC CIP requires it.

05

Is the recording tamper-evident?

Yes. Every session record is hash-chained and signed by the per-tenant pod's identity key at creation. Modifying or deleting a session record invalidates the chain, which is detected on audit. The signing keys are isolated to the per-tenant pod; an Innovexus operator cannot tamper with a customer's audit trail without breaking the chain visibly. This satisfies the integrity requirement in SOC 2 CC7.2 and NERC CIP-011 R1.

06

How does this compare to CyberArk PSM for Cisco devices?

For session recording capability on Cisco devices specifically, the two are at functional parity: full session video, searchable text, attribution, signed audit. CyberArk PSM has deeper integration with the rest of the CyberArk Identity / Vault stack, more analyst recognition, and a higher price point ($30K+/yr starting versus Innovexus from $199/mo). For mid-market teams whose primary need is Cisco session evidence and unified PAM/NOC/SOC, Innovexus is the closer fit. For Fortune-500 teams already running CyberArk Vault and adding PSM as a module, staying on CyberArk is usually the right call.

Stop hoping the audit doesn't ask for session evidence.

FROM $199 / MO5-DAY FREE TRIAL

Provision a per-tenant pod, vault your Cisco credentials, point engineers at it. Recording starts at session open. Trial is 5 days, no card required, runs against your real fleet.