UNIX Root Access Control - UNIX Sudo Access -UNIX Privilege Management

By: Beyondtrust  09-12-2011

Powerbroker Servers for UNIX

PowerBroker Servers provides protection from the inherent risks associated with users possessing highly-restricted system permissions. Misuse of privilege, be it intentional, accidental, or indirect, can be avoided as any unauthorized command is blocked before it can be executed. In addition, all user activity is monitored and logged down to the keystroke level, providing a comprehensive solution for addressing audit and compliance requirements. PowerBroker Servers can also flexibly adapt to the increasing scale and complexity of rapidly changing physical, virtual, and cloud environments, allowing for secure and efficient deployment and expansion within any IT infrastructure.


Other products and services from Beyondtrust

09-12-2011

Datacenter Virtualization Security Software - Virtualized Environment Identity Management - Virtual Environment Access Management

Misuse of privilege, be it intentional, accidental, or indirect, can be avoided as any unauthorized command attempted on a guest operating system or hypervisor host is blocked before it can be executed. PowerBroker Virtualization provides protection from the inherent risks associated with users possessing highly-restricted system permissions within virtualized data center environments.


09-12-2011

Identity Management Security - Identity Management Product

The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, public, private, and hybrid cloud environments. BeyondTrust offers consistent policy-driven, role-based access control, monitoring, logging, and reporting to protect internal assets from the inside out.


09-12-2011

Identity Management System - User Identity Management

Using PowerBroker, an administrative user can be provided access to a privileged account at the hypervisor level or inside a virtual machine, and can be managed by policy to perform only the certain actions or commands that are appropriate to the functions he/she needs to accomplish.