Highlighted Features

Watch annotated session replays and even search for specific commands

Auditing and Governance

Analyze user behavior by collecting, securely storing and indexing keystroke logs, session recordings and other privileged events.

  • Forensic Investigation
  • User Behavior
  • Privilege Validation
Policy Controls
Define privileges centrally for all users

Fine Grained Least Privilege

Elevate privileges for standard users on Unix and Linux through fine-grained, policy-based controls.

  • Centralized policy controls user activity
  • Complete record of all activity
  • Goes beyond the traditional "Who, What, and Where"
Roles Basic Commands
Define which commands can be used by user groups

Remote System App Control

Enable users to run specific commands and conduct sessions remotely based on rules without logging on as admin or root.

  • Restrict activity to defined commands
  • Eliminate the need to login to critical servers
  • Permits automation efficiency
Role Based Policy
Define access schedules and when to expire privileges

Dynamic Access Policy

Utilize factors such as time, day, location and application/asset vulnerability status to make privilege elevation decisions.

  • Permits ABAC
  • Risk Based Control
File Integrity Policy
Set file integrity monitoring policies

File and Policy Integrity Monitoring

Audit and report on changes to critical policy, system, application and data files.

  • Detect changes
  • Data may be forwarded to a SIEM
  • May be required by audit
Threat Report - Privilege Management
Report on hosts, commands, users, and events

Threat Reporting and Analytics

Correlate user behavior against asset vulnerability data and security intelligence from best-of-breed security solutions.

  • Searchable Index
  • Scheduled Reports
  • Custom Reporting
  • Single Events Window

15 Server Privilege Management Use Cases for Unix & Linux

progressive steps to helping you eliminate sudo and achieve greater control over Unix and Linux. Download it now to get started.

All Features of Privilege Management for Unix and Linux

Feature Description
Auditing & Governance Analyzes user behavior by collecting, securely storing and indexing keystroke logs, session recordings and other privileged events. This capability speeds forensics and simplifies compliance by providing an unimpeachable audit trail of all user activity.
Graphical Log Review & Session Playback Search, view and playback collected audit data.
GUI-based Administration Console Web-based administration interface that helps to discover, deploy, upgrade and manage systems.
Remote System & Application Control Enables users to run specific commands and conduct sessions remotely based on rules without logging on as root. This capability enhances user productivity by simplifying processes that are complex with native tools or sudo, limits attack surfaces by preventing the use of the root and admin account, and keeps systems safe by only allowing approved applications and commands to be executed.
Dynamic Access Policy Utilizes factors such as time, day, location and application/asset vulnerability status to make privilege elevation decisions. This capability reduces attack surfaces by helping IT make privilege decisions based on context and risk.
GUI-based Policy Role-based privilege elevation polices configured using a GUI.
Fine-Grained Least Privilege Elevates privileges for standard users on Unix and Linux through fine-grained, policy-based controls. This capability enables compliance through the compartmentalization of IT tasks that require privileged accounts, and limits attack surfaces by providing just enough access to complete a task.
File & Policy Integrity Monitoring Audits and reports on changes to critical policy, system, application and data files. This capability reduces risk by ensuring that critical files have not been tampered with, protects critical files from malware and privilege misuse, and eliminates workarounds or gaps that could lead to exploits.
System Level Controls Controls what the system will do vs. what the user types.
System Level Auditing Audit file system operations and scripts.
Privileged Shells Default user shells to control privilege and audit user activity.
Data Driven Policies Policies controlled by external data sources such as LDAP and databases.
Privileged Threat Analytics Correlates user behavior against asset vulnerability data and security intelligence from best-of-breed security solutions. This capability reduces the risk that user activity can lead to a potentially damaging data breach.