Perimeter security is an important piece of a holistic cybersecurity posture—but it’s just one piece. Once a threat actor (either a rogue insider who already has access, or an external attacker who pierces the perimeter) has a foothold within your network, the ability to restrict access from point to point, and to rapidly detect and respond to suspicious activity is imperative.
In our new technical brief, "Controlling Lateral Movement in Unix and Linux Environments", discover how to leverage BeyondTrust’s gold-standard privilege management solution, PowerBroker for Unix & Linux, to tighten access controls in your *NIX server environment and to prevent or stop threats before they morph into damaging security events. This paper will detail how to leverage PowerBroker for Unix & Linux to enforce the principles of a mature system access model as it applies to:
- Identity Management
- Access Control
- Server Configuration and Monitoring
Chad Erbe, Professional Services Architect, BeyondTrust
Chad Erbe is a Certified Information Systems Security professional (CISSP), with nearly 30 years’ experience in a Unix/Linux administration role. Chad has worked in DoD high-security environments, manufacturing, and with large financial services companies throughout his career. This broad experience has lead him to an architectural role with BeyondTrust where he focuses on Privileged Access Management, particularly in the Unix suite of products. Chad also maintains his PCI ASV certification from the PCI council.