Pm_unix_linux_datasheet_web.pdf

  • Uploaded by: waseem
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Pm_unix_linux_datasheet_web.pdf as PDF for free.

More details

  • Words: 509
  • Pages: 2
PRIVILEGE MANAGEMENT FOR UNIX & LINUX PROTECT PRIVILEGED ACCOUNTS AND ACHIEVE COMPLIANCE

BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that gives you unmatched visibility and control over complex server environments.

Features and Capabilities

Limit Root Access



Auditing & Governance: Analyze user behavior by collecting, securely storing, and indexing keystroke logs, session recordings, and other privileged events.



Fine-Grained Least Privilege: Elevate privileges for standard users on Unix and Linux through fine-grained, policy-based controls.



Dynamic Access Policy: Utilize factors such as time, day, location, and application/asset vulnerability status to make privilege elevation decisions.



Remote System & Application Control: Enable users to run specific commands and conduct sessions remotely based on rules—without logging on as admin or root.



File & Policy Integrity Monitoring: Audit and report on changes to critical policy, system, application, and data files.



Privileged Threat Analytics: Correlate user behavior against asset vulnerability data and security intelligence from best-of-breed security solutions.

Provide fine-grained privilege elevation rules to execute only specific tasks or commands.

Audit All User Activity Protect against unauthorized

HOW IT WORKS

changes to files, scripts, and directories.

POLICY 1

2

Monitor Logs & Sessions Detect suspicious user, account,

EVENT LOG

and asset activity in real-time.

4

CLIENT

POLICY/LOGGING SERVER(S) 3

1

User requests are sent to the policy servers

2

Requests are checked against central policy

3

Request is written to 4 central event log, with optional session recording

SESSION RECORDER

Policy decision is sent back to the user

PRIVILEGE MANAGEMENT FOR UNIX & LINUX

Supported Platforms

BeyondTrust Privilege Management for Unix & Linux supports more than 100 platforms, including Debian GNU, HP-UX, HP Tru 64, Red Hat Enterprise Linux, Sun Solaris, SuSE Linux Enterprise, VMware ESX, IBM AIX, and others.

BUSINESS BENEFITS

“The Privilege Management for Unix and Linux implementation was very successful. All server access is limited – even via SSH. The auditors can easily see that procedures are being followed, and our IT employees are able to remain productive.” SVP SYSTEMS / RECOVERY, CTO, DCI

Ensure Compliance • Provide an unimpeachable audit trail of all user activity. • Enable compliance through the compartmentalization of IT tasks that require privileged accounts. • Ensure that critical files and policies have not been tampered with.

Secure Critical Systems and Files • Limit attack surfaces by providing just enough access to complete a task. • Prevent the use of the root account. • Enable only approved applications/commands to be executed. • Eliminate workarounds or gaps that could lead to exploits. • Make privilege decisions based on context and risk. • Protect critical files from malware and misuse.

Improve Efficiency • Streamline processes that are complex with sudo. • Simplify management and speed deployments with a central management console.

BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing privilege-related breaches. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. We are trusted by 20,000 customers. beyondtrust.com V2019_02_ENG

More Documents from "waseem"

2007 Defense Of The Lung.ho
December 2019 12
Cbj.docx
November 2019 9
Report Of Volka Food.docx
December 2019 4
Info 2.docx
November 2019 7