Separate permissions on privileged accounts such as the root user in your UNIX and Linux environment. BeyondTrust Privilege Management for UNIX & Linux provides an effective approach to centrally controlling the delegation of rights to individual users and sessions, based on policies. It also offers comprehensive logging options, up to and including the recording and playback of sessions.
BeyondTrust Privilege Management for UNIX & Linux enables IT organizations to delegate tasks requiring root or other extended privileges on UNIX, Linux and OS X systems, without having to disclose the associated passwords. By defining authorization policies centrally, companies can use BeyondTrust Privilege Management for UNIX & Linux to assign the specific permissions needed to fulfill tasks.
BeyondTrust Privilege Management for UNIX & Linux also offers evaluable auditing – including recording and replaying sessions – as well as comprehensive reporting, which helps customers to meet their internal and external compliance requirements. Thousands of IT organizations worldwide – including those with the strictest regulatory requirements – have already chosen BeyondTrust Privilege Management for UNIX & Linux as their privilege management solution.
Centralized control and provision of audit data significantly reduce administrative workload.
Enables very specific control over who can do what, where and when.
BeyondTrust Privilege Management UNIX & Linux offers support for more than 30 different UNIX, Linux and OS X platforms.
Pluggable Authentication Module (PAM) support means standard industry methods can be used for authentication.
The least privilege principle can be implemented technically by limiting the granting of privileged permissions to necessary tasks.
BeyondTrust Privilege Management for UNIX & Linux is part of the BeyondInsight IT Risk Management Platform, which combines all of the BeyondTrust Privileged Account Management modules with Retina CS Vulnerability Management. This enables:
The result is that information about users and devices is merged, which enables cross-team risk reduction in complex environments.