BeyondTrustBeyondTrust released PowerBroker UNIX & Linux 7.5 to scrutinize company-wide activities occurring on critical Unix and Linux servers from a root delegation perspective.
This release will display I/O logs in console, offer search capability of I/O logs, enable playback functionality of sessions, and provide events graphics and charge.
PowerBroker Servers for UNIX & Linux empowers system administrators to delegate root tasks and authorization on Unix, Linux and OS X systems without disclosing the elevated accounts password. It supports over 175 Unix, Linux and Mac OS X platforms.
Using centralized authorization policies, PowerBroker enables enterprises to implement controls over elevated permissions to the most granular level, and reduce administration and overhead normally associated with these tasks.
PowerBroker UNIX & Linux allows users to perform tasks across multiple targets simultaneously, and is readily deployed, requiring no changes to the kernel, no system reboots and eliminating the impact on resource availability. PowerBroker provides audit-friendly logging and comprehensive reporting which helps enterprises meet both internal and external compliance requirements.
PowerBroker UNIX & Linux breaks down familiar walls that hinder productivity, while offering boundaries necessary for a secure and compliant environment. It also provides relief from any type of misuse of privilege and seals the primary attack point for data breaches and unauthorized transactions.
The new release integrates with the Retina CS vulnerability management platform to improve enterprise security systems by bringing the relevant information into focus and separating potential from real threats. Enterprises can better prioritize their policy adaptations, remediation activities and attack-response practices.
“Organizations can now make better-informed decisions around root delegation on their most critical UNIX and Linux servers,” said Brad Hibbert, executive vice president of product strategy and operations at BeyondTrust.
“We’re providing customers an incredibly powerful zero-gap coverage model for their diverse IT environments by coupling privilege and identity management along with vulnerability management,” he added.