Privilege Manager 11: New privilege management capabilities for Unix and Linux

With the latest release of Privilege Manager, all endpoints and servers throughout your organization can now follow consistent least privilege and Zero Trust policies, whether they are Windows, Mac, or Unix/Linux. Until now, privilege security for Unix/Linux has been cumbersome and even risky.  Unix/Linux has become the go-to operating system for many types of computer hardware. The applications … [Read more...]

Every system is a privileged system: Incorporating Unix/Linux in your privilege management strategy

Lately we’ve been banging the drum that “every user is a privileged user,” meaning privileged users aren’t limited to system administrators but also include business users with access to applications and endpoints linked to critical business data and functions. The second verse to that refrain is that “every system is a privileged system.” Within your IT environment, laptops, servers, databases, … [Read more...]

Announcing Identity Bridge: Streamline authentication and authorization for Unix and Linux

I’ve been working in the identity and access management (IAM) field for more than 20 years. Unix and Linux user management has been a challenge throughout all those years. If you have a single Unix or Linux server and a manageable number of users, there’s no issue. But no one only has one server and a manageable user count. Many organizations have hundreds or thousands of servers and hundreds or … [Read more...]

Think Differently About Unix / Linux Privilege Management

Security models have struggled to match the evolution of Unix. Over its long history, Unix has evolved and changed in many different ways. What started in Bell Labs 40 years ago has spawned more than 150 variants of Unix in use today. Unlike the linear progression of Windows operating systems, in which most organizations use a single version until it is replaced, many flavors of Unix are in use at … [Read more...]