On-Demand Webinar
The Effects of Cloud Migration on IAM, PAM, and Audit
Tue, 09/18/2018
With the fast pace of development, companies are continually reassessing which cloud infrastructures provide the most dynamic provisioning for their business units. Both enterprises and SMBs must constantly review how to balance cost and efficiency when choosing how to best manage their cloud.
Blog
Network Monitoring for Government Agencies: Areas of Focus
Thu, 08/30/2018
Network monitoring is crucial to ensuring a healthy network with maximum uptime for your users. But as a government agency, it’s even more critical.
Blog
Are Employees Undermining Your Data Breach Defenses from the Inside?
Fri, 06/29/2018
The latest Verizon Data Breach Report provides a deeper understanding of the internal threats today's organizations face.
On-Demand Webinar
Help Your Tech-Driven School Thrive with Network Monitoring
Learn how network monitoring can help support a tech-driven education at your institution.
On-Demand Webinar
What Does GDPR Mean for Linux/UNIX and IT Operations?
Tue, 05/22/2018
Find out how GDPR will affect IT Operations on Linux and UNIX.
On-Demand Webinar
Network Monitoring is Critical for the Internet of Things
Learn how Intermapper’s robust network monitoring capabilities give you a critical safeguard against the dangers lurking in the Internet of Things.
Blog
A New Hope for Business Intelligence [Webinar Recap]
By Mike Stegeman on Mon, 05/07/2018
Insite Analytics can access any data and analyze all on one dashboard.
Sudo Migration Made Simple
Sudo’s “free” open-source access utility can work for managing access to a small number of servers. However, it quickly becomes overwhelming as your business grows and requires more sophisticated fine-grain controls, logging, and compliance-reporting capabilities.
Sudo’s labor-intensive custom configuration and distribution process results in high administrative costs and serious gaps in access...
Blog
What’s the Future of Your Data?
By Mike Stegeman on Fri, 04/06/2018
Find out why it’s important to plan for the future of your data now.
On-Demand Webinar
The Secret to Speedy Remediation
Learn how to cut your remediation time from hours to minutes thanks to an integration between two Fortra products, Intermapper and Automate.
Blog
Shouldn’t Data Access Be Easier?
By Mike Stegeman on Wed, 04/04/2018
You don't have to settle for the same old inefficient data access any longer. There are easier ways to access your data.
Windows SSH Client for Centralized Access Control
Since the end of the “PKI Wars” in the early 2000s, many question the security of Windows desktops environments. This is because it can be difficult to verify whether they’ve been fully locked down.
For Linux/UNIX administrators the tool of choice to log in to systems for remote session administration is PuTTY, a free command line tool, or SuperPuTTY, a Windows edition with scalable windo...
Provisioning Accounts to Multiple Security Domains
Core Privileged Access Manager (BoKS)’s main strength is its ability to create a single security domain of your IT assets, with a single policy set. There are, however, valid reasons to segregate networks, and infrastructure due to:
Differing IT governance, often due to historical M&A activities
The need to report to multiple market regulators or compliance regimes
Public internet-fa...
Pluggable Authentication
Pluggable authentication module (PAM) support in UNIX and Linux operating systems have met, or not met, common standards over the last twenty five years. Vendor-specific wrinkles in meeting PAM specifications have needed coding and operational adjustments. Core Privileged Access Manager (BoKS) hides the platform-specific behavior and operational constraints from centralized security staff for impr...
On-Demand Webinar
Privileged Access Management for Linux, UNIX, and AIX Professionals
Learn how to protect your systems and data with a single solution that delivers granular security controls, automated workflows, and enables limitless scalability.
IT Security Audits and Reporting
Are you spending too much time getting your environment through IT security audits, PCI reporting, SOX reporting, EU GDPR, or other national data privacy regulations? Many organizations find it’s difficult to truly enforce who accesses which servers and what they can do when they get there. They also question whether they are controlling privileged user access rights and eliminating root and...
Keystroke Logging
Keystroke logging on Linux and UNIX systems has typically been the province of third-party tools not well integrated into security policy management. However, cultural and legal differences in the mechanics of how session logs are collected and stored, as well as who may review them can require significant security policy differences as they are implemented. This is especially true in a Linux/UNIX...