Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Do You Know Where Your Linux/UNIX Users Are?

March 13, 2012

  • Blog
  • Archive
Or even who they are? Sure you do, you say. You have someone responsible for managing Linux and UNIX user accounts. She manages the user store, grants user access to specific Linux/UNIX servers, and assigns specific privileges to users on those servers. When someone leaves the company, she makes sure the specific user accounts are removed. When someone assumes a new role within the company, she modifies the privileges accordingly. Really, though – do you actually know that your Linux and UNIX users are being managed with the same rigor as your Windows users? Do you know what IT assets they have access to? Do you know for sure that there aren’t orphaned UNIX and Linux user accounts for employees that have long since moved on, that are still active? Your lead administrator for UNIX and Linux systems may be as competent as they come, but managing separate user accounts is a manual, labor-intensive process – which means it’s a process highly subject to human error. If you deploy Active Directory in your IT infrastructure, you likely have a firm grasp of who your Windows users are and what privileges they have. You define access policies and push them out to your Windows users. You manage the users through a centralized repository. You wipe out user accounts the day its owners leave the company. Point and click; done. So, don’t you find it interesting that 97% of companies use Active Directory in some capacity but the vast majority don’t join their Linux and UNIX users to it, even though the technology to do so has been around for years? It’s even more surprising given the fact that the most privileged users in your organization probably have Linux and UNIX user accounts, and thus present the highest insider threat risk, through either intentional or accidental means. Your most critical assets are likely Linux and UNIX servers. These are the devices that house your most sensitive data, the servers upon which your most business-critical applications run. So why are your Linux/UNIX user accounts managed in silos, separate from the secure infrastructure of Active Directory? You don't have to look far to find a best-of-breed solution that combines the ease and flexibility of enabling AD as an infrastructure-wide repository for all of your users – Linux/UNIX as well as Windows – with the robustness of enterprise-class privileged user management tools for your Linux and UNIX environments. Simplified, secure, heterogeneous user management combined with powerful oversight and control over your most critical assets is a combination that brings the best gift of all to an IT professional – peace of mind.
Photograph of Scott Lang

Scott Lang, Sr. Director, Product Marketing at BeyondTrust

Scott Lang has nearly 20 years of experience in technology product marketing, currently guiding the product marketing strategy for BeyondTrust’s privileged account management solutions and vulnerability management solutions. Prior to joining BeyondTrust, Scott was director of security solution marketing at Dell, formerly Quest Software, where he was responsible for global security campaigns, product marketing for identity and access management and Windows server management.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Solutions to the Qatar National Information Assurance Policy v2.0

Whitepapers

KuppingerCole Executive Review - BeyondTrust Endpoint Privilege Management

Webcasts

Tech Talk Tuesday: Managing Vendor Access

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.