Centralized Security Policy Administration
Over the years, organizations have taken different approaches to defining and managing operating system security configuration for their UNIX and Linux implementations. For example, a simple item like enforcing password length and complexity is implemented using five separate methods on today’s enterprise Open System platforms.
Core Privileged Access Manager (BoKS) takes care of the underlying ...