BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

The 5 Things Every Linux Administrator Should (and Should Not) Do When It Comes to Privileged Account Management

Posted February 3, 2014    Sarah Lieber

When it comes to privileged account management the list of things an administrator can do to protect their environment is seemingly never ending. Last week we hosted a webinar with Oracle Linux and presented a list of 5 things every Linux administrator should, and should not, do when managing privileged accounts. Given the current security landscape and the threats we’ve discovered from breach reports, we see the management of privileged accounts as a critical business function of security. In the video below we cover the few tips in hopes to give you the best security return-on-investment for each dollar and hour you spend on implementation.

Led by Avi Miller, Product Manager, at Oracle and Paul Harper, Product Manager, at BeyondTrust, the webinar below covers the 5 Do’s and 5 Don’ts when it comes to privileged account management. Avi and Paul also covered specifically how you can protect privileged accounts within the Oracle Linux environment with BeyondTrust’s PowerBroker for Linux solution. Watch the webinar below. Enjoy!

The 5 Things Every Linux Administrator Should (and Should Not) Do When It Comes to Privileged Account Management from BeyondTrust on Vimeo.

Tags:
, , , , ,

Leave a Reply

Additional articles

PowerBroker for Unix & Linux helps prevent Shellshock

Posted September 25, 2014    Paul Harper

Like many other people who tinker with UNIX and Linux on a regular basis, BASH has always been my shell of choice.  Dating back to the early days moving from Windows to a non-Windows platform, mapping the keys correctly to allow easy navigation and control helped ensure an explosion of use for the shell. Unfortunately,…

Bash “Shellshock” Vulnerability – Retina Updates

Posted September 24, 2014    BeyondTrust Research Team

A major vulnerability was recently discovered within bash which allows arbitrary command execution via specially crafted environment variables. This is possible due to the fact that bash supports the assignment of shell functions to shell variables. When bash parses environment shell functions, it continues parsing even after the closing brace of the function definition. If…

pbps-blog3

7 Reasons Customers Switch to Password Safe for Privileged Password Management

Posted September 24, 2014    Chris Burd

It’s clear that privileged password management tools are essential for keeping mission-critical data, servers and assets safe and secure. However, as I discussed in my previous post, there are several pitfalls to look out for when deploying a privileged password management solution. At this point, you may be wondering how BeyondTrust stacks up. With that,…

Tags:
, , , , ,