Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Privilege Management for Unix & Linux Continues Rapid Growth by Securing Cloud Infrastructure

January 21, 2021

  • Blog
  • Archive

BeyondTrust is excited to announce record growth of its Privilege Management for Unix / Linux solution in Q4 2020 due to a growing commitment from larger, cloud-focused enterprises to protect their core and digital infrastructure.

With 96% of the world’s web servers running Linux, solid security and heightened visibility are critical for larger enterprises, particularly in banking, finance, online retail, and manufacturing, especially those offering a SaaS solution. Before 2020, most ransomware targeted Windows devices. But the pandemic accelerated digital transformation, creating a massive boom in the remote workforce and adoption of cloud applications. Since nearly all these apps are powered by Linux, these servers are now just as much at risk by malicious actors, but with a much greater impact if successfully attacked.

This situation requires a solution designed with Linux in mind since most organizations store their most sensitive data and applications on mission-critical Linux platforms. In fact, 90% of all cloud infrastructure operates on Linux, so a single ransomware attack could be catastrophic for organizations. Researchers at Kaspersky discovered more than 12 advanced threat actors using Linux malware or Linux-based modules.

“BeyondTrust is the only vendor offering a proven, enterprise-class privilege management solution purpose-built for Unix and Linux servers,” said Daniel DeRosa, Chief Product Officer at BeyondTrust. “The tremendous growth last year shows that sophisticated enterprises are serious about securing their platforms against threats. We’re proud that our comprehensive enterprise solution is helping hundreds of companies meet those security challenges as Linux becomes increasingly appealing as an attack vector for bad actors.”

As of late 2020, more than one million assets were under management with BeyondTrust Privilege Management for Unix & Linux and Active Directory (AD) Bridge. One of the solution’s most popular capabilities is passwordless administration by default. Administrators can configure the solution to “trust” users to perform administrative tasks without requiring a privileged root password. This frees up IT resources from having to maintain distributed sudoers files. Instead, administrative functions can be policy-based and centrally managed.

“Security risks are taken very seriously in the financial industry,” says Brandon Haberfield, Global Head of Operating Systems, Investec Bank. “After researching the various options, and using sources such as Gartner, we chose BeyondTrust’s Privilege Management for Unix & Linux because of flexibility. It allowed Investec to define a security standard, but also enabled different departments to manage exceptions. When COVID-19 occurred, working from home made no difference to the way their employees accessed their environment because the policies were already in place.”

Designed to help enterprises mitigate threats against Linux, BeyondTrust Privileged Management for Unix & Linux is an advanced enterprise product that empowers the move to the cloud. The solution offers several other key advantages to larger enterprises, enabling them to:

  • Gain extreme visibility with a comprehensive audit trail of everything that happens in their SaaS or cloud environments, including centralized keystroke logs, session recordings and all other privileged events
  • Scale without limits; BeyondTrust’s largest deployment involves an enterprise using the Privileged Management for Unix & Linux solution to secure more than 130,000 endpoints protecting and giving visibility to their SaaS infrastructure
  • Centralize identity and group management with Active Directory bridging and avoid the hassle of managing and auditing shared or local accounts
  • Configure the solution to fit any business environment or vertical, including healthcare, retail, finance, legal, energy, and cloud
  • Integrate BeyondTrust Privilege Management for Unix & Linux with existing password management solutions and send information from every event to Splunk or other security information and event management (SIEM) solutions
  • Monitor file and policy integrity, making it easier to audit and report on changes to critical policy, system, application, and data files
  • Deploy, manage, and monitor enterprise environments easily with BeyondInsight. This dedicated web-based management platform allows easy control of Privilege Management for Unix & Linux and Active Directory Bridge environments

Many alternative solutions feature components not built specifically for Linux and incapable of providing passwordless privilege elevation. Such a solution could potentially restrict an enterprise’s move to the cloud rather than support it. BeyondTrust has more than 30 years of experience protecting some of the largest SaaS and cloud environments. In the Gartner Critical Capabilities Report for Privileged Access Management, BeyondTrust was rated a 4.8, the highest score for Privilege Elevation and Delegation.

For details on how enterprises are using server privilege management, download “How to Achieve the NIST Zero Trust Approach with Unix & Linux Remote Access.”

To view a demo, visit beyondtrust.com/privilege-management/unix-linux.

Photograph of Liz Shulof

Liz Shulof, Chief Marketing Officer

As Chief Marketing Officer, Liz Shulof is responsible for all aspects of Marketing, including Corporate Communications, Digital Marketing, Product Marketing, and Field Marketing. Shulof has more than 15 years of experience developing and managing strategic and marketing initiatives for B2B technology companies. Before joining BeyondTrust, Shulof served as Vice President at Greenough Communications, where she managed public relations programs for clients, including Quest Software, Numara Software, and IGEL Technology. Previously, Shulof spent more than five years in strategy and technology consulting with Accenture. She holds a Bachelor of Arts in Communications from Purdue University.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Up next

From January 21, 2021:
BeyondTrust Remote Support Version 21.1 Introduces New Capabilities for Unattended Support, Raspberry Pi, Zebra Devices, & More
From January 26, 2021:
DevSecOps, Containers, & Unified Secrets Management

You May Also Be Interested In:

Webcasts

Cloud = Linux: Top 8 Steps to Securing Linux in the Cloud

Whitepapers

The Guide to Multicloud Privilege Management

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.