On-Demand Webinar
The Truth About Viruses on Linux
By Bob Erdman
This webinar is designed to re-assess the threat landscape and learn which metrics your technical staff must use when assessing server-side tools that virus scan for both Windows and Linux threats in parallel.
On-Demand Webinar
What Does GDPR Mean for Linux/UNIX and IT Operations?
Tue, 05/22/2018
Find out how GDPR will affect IT Operations on Linux and UNIX.
On-Demand Webinar
Survey Results: Cybersecurity Risk Mitigation Strategies
By Robin Tatam
Fortra surveyed more than 600 IT and cybersecurity professionals to find out what security exploits loom largest and what strategies they’re turning to for protection. Get the results in this on-demand webinar.
Blog
Cloud Misconfiguration and the Curse of the Inadvertent Employee
By Bob Erdman on Fri, 04/20/2018
There is a new term IBM and other industry experts have begun to use: the inadvertent employee. These are the well-meaning IT professionals who are often at fault when it comes to misconfigured servers, networks, and databases.
On-Demand Webinar
Privileged Access Management for Linux, UNIX, and AIX Professionals
Learn how to protect your systems and data with a single solution that delivers granular security controls, automated workflows, and enables limitless scalability.
Case Study
Large Health System Turns to Core Privileged Access Manager (BoKS) for Server Management & System Security
A leading not-for-profit health system in the United States, with multiple hospitals, rehabilitation centers, physician clinics, mental health facilities, independent living centers, and home health agencies, employs more than 9,000 individuals, including nearly 1,400 physicians. Collectively, the entities within the healthcare organization also maintain more than 1,500...
Case Study
Leading Global Manufacturing Company Streamlines Administration with Centralized Privileged User Management
Ability to automate ‘what and which’ authentication methods are utilized based on the access request also significantly improves administrator productivity.
Case Study
Top 5 Worldwide Bank Uses Core Privileged Access Manager (BoKS) for Privileged Access Management
Ensuring security and privacy are central to the continued success for one of the largest bank holding company in the United States. With over 13 million individuals and business customers, this full-service banking, brokerage, and investment company understands the importance of protecting customer information.
...
Article
With Public Cloud OS Instances Growing, Security Challenges Grow, Too
Tue, 03/13/2018
Image
“Some cloud vendors tout that systems deployed within their framework require little or no administration: You create an image with the software and applications that you want it to provide services for, spin it up in a management console, and Voila! you have an entirely new system online; with minimal cost, no hassle, little...
Article
Perspectives on the Changing Linux Ecosystem
Tue, 03/13/2018
Media
Image
Text
In the early 1990s the Open Software Foundation formed a committee to select and standardize a new Management Platform Toolset for and from the UNIX ecosystem....
Guide
Controlling SSH for Security and Compliance
SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control?
SSH, Secure Shell protocol, is now nineteen years old and...
Guide
Our Privileged Access Management Solution - Your Sudo Replacement
Learn how to reduce the risk of insider fraud, streamline regulatory compliance, and greatly reduce administration efforts with an effective privileged access management solution.
Article
Sudo or SuDon't: Manage Your Privileged Command Execution and Sudo Policies
Mon, 03/13/2017
System admins need root level authority at all times, system operations staff needs periodic database and application account authority, and security admins needing to protect the environment are some of the few of the challenges of managing privilege in the enterprise server infrastructure. Read this article to learn more about Sudo alternatives.
Article
Managing IT Access Privileges
Mon, 03/13/2017
Image
THE UNSOLVED PROBLEM
Secure, private, effective use of computers by a company (including hosted, cloud and other services as well as the company’s own systems) relies on managing access privileges.
The problem isn’t unique to computers. Office buildings, hotels, apartments and college dorms, for example, typically have “master...
Article
Solving Healthcare Security Concerns
Mon, 03/13/2017
According to a recent KPMG report, four-fifths of executives at healthcare providers and payers say their information technology has been compromised by cyberattacks. That same report presents how the increased risk to healthcare organizations relates to the richness and uniqueness of the information that health plans, doctors and hospitals handle. Apart from typical financial...