BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Linux Proliferation Raises Security & Compliance Alerts

Posted November 16, 2010    Peter McCalister

The Linux Foundation recently conducted a survey of Linux users who represent the largest enterprise companies and government agencies. The survey found that Linux is poised for growth in the coming years, with 76.4 percent of companies planning to add more Linux servers in the next year.

Linux workloads are also changing, with 60.2 percent of respondents claiming that they plan to use Linux for more mission-critical workloads than they have in the past. Since Linux is on the brink of a usage explosion and considering that a large portion of Linux resources are going to be used for mission-critical workloads, enterprises must ensure that proper security and compliance planning is being transitioned in with the new Linux systems.

A first step that should be taken is implementing a solution that has the ability to delegate granular (least) privileges and authorization without disclosing the root password for Linux platforms. By protecting the root password from misuse of privileged access, an enterprise will be able to meet the security and compliance demands of a Linux server and desktop explosion.

Leave a Reply

Additional articles

powerbroker-for-mac-diagram-small

PowerBroker for Mac: A Least-Privileged Apple a Day…

Posted July 27, 2015    Jason Silva

BeyondTrust PowerBroker for Mac reduces the risk of privilege misuse by enabling standard users on Mac OS X to perform administrative tasks successfully without entering elevated credentials.

Tags:
, ,
PrivilegedAccountManagement

On Demand Webinar – Now is the time for Privileged Account Management

Posted July 24, 2015    BeyondTrust Software

In this webinar, SANS Instructor and Founder of Voodoo Security, Dave Shackleford, will revisit several hacking and breach scenarios that involved privileged accounts, and use these as examples while discussing tools and tactics to get this problem under control once and for all.

Tags:
, ,
dave-shackleford-headshot

Privileged Account Management: The Time is Now

Posted July 22, 2015    Dave Shackleford

There’s plenty of problems we don’t have great options for in InfoSec today. Malware is a pain point that keeps evolving rapidly. 0-day exploits are tough to prepare for. Privileged account management? We got this. We know the root causes, we know how it manifests, we know how to get it under control effectively, and there are great technology solutions that are enterprise-class.

Tags:
, ,