BeyondTrust Privilege Management for UNIX & Linux

Regain control of your critical server environment

Separate permissions on privileged accounts such as the root user in your UNIX and Linux environment. BeyondTrust Privilege Management for UNIX & Linux provides an effective approach to centrally controlling the delegation of rights to individual users and sessions, based on policies. It also offers comprehensive logging options, up to and including the recording and playback of sessions.

BeyondTrust Privilege Management for UNIX & Linux enables IT organizations to delegate tasks requiring root or other extended privileges on UNIX, Linux and OS X systems, without having to disclose the associated passwords. By defining authorization policies centrally, companies can use BeyondTrust Privilege Management for UNIX & Linux to assign the specific permissions needed to fulfill tasks.

BeyondTrust Privilege Management for UNIX & Linux also offers evaluable auditing – including recording and replaying sessions – as well as comprehensive reporting, which helps customers to meet their internal and external compliance requirements. Thousands of IT organizations worldwide – including those with the strictest regulatory requirements – have already chosen BeyondTrust Privilege Management for UNIX & Linux as their privilege management solution.


Security and compliance

All user and administrator activity is encrypted and stored in a secure central location. Data are encrypted during transmission and storage.

Separating responsibilities

Genuine separation of responsibilities is achieved. Users, administrators and auditors only have access to the data and commands relevant to them. Privileged accounts are no longer shared.

Migrating away from sudo

BeyondTrust Privilege Management for UNIX & Linux provides a scalable solution for businesses whose compliance and auditing requirements exceed the capabilities of sudo. The use of privileged permissions is centralized and can be controlled more flexibly and audited reliably.


Central Administration & Auditing

Centralized control and provision of audit data significantly reduce administrative workload.

Flexible policy language

Enables very specific control over who can do what, where and when.

Comprehensive platform support

BeyondTrust Privilege Management UNIX & Linux offers support for more than 30 different UNIX, Linux and OS X platforms.

Flexible authentication and authorisation

Pluggable Authentication Module (PAM) support means standard industry methods can be used for authentication.

Granular delegation of privileged permissions

The least privilege principle can be implemented technically by limiting the granting of privileged permissions to necessary tasks.

Integration with BeyondInsight

BeyondTrust Privilege Management for UNIX & Linux is part of the BeyondInsight IT Risk Management Platform, which combines all of the BeyondTrust Privileged Account Management modules with Retina CS Vulnerability Management. This enables:

  • Central management with uniform dashboards.
  • Asset discovery, including profiling and grouping.
  • Enhanced reporting and analysis features.
  • Workflows and integration using trouble ticket systems.
  • Data exchange between Retina and Auditor components.

The result is that information about users and devices is merged, which enables cross-team risk reduction in complex environments.