Software

BeyondTrust Privilege Management for Unix and Linux

by BeyondTrust

Logo of BeyondTrust

Key Facts

  • Control Root Access: Provide fine-grained privilege elevation rules to perform only specific tasks or commands
  • Audit User Activity: Protect against unauthorized changes to files, scripts and directories
  • Monitor and Replay: Detect suspicious user, accounts, and asset activity in real time or on replay

Categories

  • Application security
  • User (rights) management
  • Content security
  • Data leakage/loss prevention
  • Data protection (products and services)
  • Endpoint security
  • Identity and access management
  • Log management
  • Mainframe security
  • Network monitoring
  • Network access control (NAC)
  • Security management
  • Anti-virus and malware protection
  • Web application security
  • Access protection

Key Facts

  • Control Root Access: Provide fine-grained privilege elevation rules to perform only specific tasks or commands
  • Audit User Activity: Protect against unauthorized changes to files, scripts and directories
  • Monitor and Replay: Detect suspicious user, accounts, and asset activity in real time or on replay

Categories

  • Application security
  • User (rights) management
  • Content security
  • Data leakage/loss prevention
  • Data protection (products and services)
  • Endpoint security
  • Identity and access management
  • Log management
  • Mainframe security
  • Network monitoring
  • Network access control (NAC)
  • Security management
  • Anti-virus and malware protection
  • Web application security
  • Access protection
Show More

PRODUCT DESCRIPTION

Unix and Linux systems present high-value targets for external attackers and malicious insiders. The same holds true for networked devices, such as IoT, ICS and SCADA. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance, control privileged access, and prevent and contain breaches that can affect Unix and Linux systems – without hurting productivity.

Show More
graphical blue background

How BeyondTrust Privilege Management for Unix and Linux Works

Product Expert