for Unix & Linux

Protect privileged accounts, prevent and contain breaches, and achieve compliance on Unix & Linux systems. PowerBroker enables you to eliminate credential sharing, limit root access, and ensure accountability – without hurting productivity.

Comprehensive Unix & Linux Privilege and Session Management to Protect Your Most Critical Systems

It’s no secret that Unix and Linux systems present high-value targets for external attackers and malicious insiders alike. You can expect to be breached if you share credentials, provide unfettered root access, or let files and sessions go unmonitored. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. And the risk only increases as attack surfaces expand, perimeters vanish, attackers get smarter, and compliance pressures mount.

PowerBroker for Unix & Linux is an enterprise-class, multi-layered privilege management solution that gives you unmatched visibility and control over complex server environments.

  • Reduce attack surfaces by eliminating credential sharing, enforcing least privilege, and elevating commands without requiring users to have root access.
  • Monitor and audit sessions for unauthorized access and/or changes to files and directories.
  • Analyze behavior to detect suspicious user, account and asset activity.

With over 30 years of experience in server privilege management, BeyondTrust knows what it takes to protect your critical, tier-1 systems, and help you reduce risk and achieve compliance.


Align with Least Privilege Best Practices

Align with Least Privilege Best Practices

Implement least privilege initiatives with fine-grained, role-based policy control over privileged accounts.

Monitor Sessions for Accountability

Monitor Sessions for Accountability

Speed forensics and auditing with fully-indexed keystroke logs, command logs, and session recordings of all user activity.

Centralize and Simplify Privilege Management

Centralize and Simplify Privilege Management

Gain control through a centralized policy and management console, with HTML5 and command-line options.

Gain Enterprise-Class Efficiency

Gain Enterprise-Class Efficiency

Automatically replicate files and settings between managed hosts, eliminating time and effort spent on manually copying files.

Meet Audit and Compliance Requirements

Meet Audit and Compliance Requirements

Achieve policy-driven command control and auditing – down to the system level – with no change to the user experience.

Monitor File Integrity

Monitor File Integrity

Ensure that system binaries, product binaries, and files have not been tampered with. All changes are fully audited and reviewed.

Secure Remote Host Execution

Secure Remote Host Execution

Increase efficiency and security by enabling users to run commands and conduct sessions on remote systems without logging on.

Leverage Flexible Deployment Options

Leverage Flexible Deployment Options

Implement on-premise software or hardware appliances, or host in Amazon Web Services and other cloud services.

Evolve Beyond Sudo

Evolve Beyond Sudo

Replace open-source tools with a commercial solution that supports over 100 Unix and Linux variations with centralized management and command-level delegation, backed by comprehensive auditing, monitoring, and threat analytics.


System-level control and audit: Provides control over applications down to the system level, regardless of how the application is initiated. Enhanced auditing ensures that administrators can easily monitor and alert on suspicious and inappropriate activity providing much faster forensics and audit reviews using session logs.

Segregation of duties: Centralized control allows for true separation of duties, limiting users, administrators and auditors access to only the data relevant to them.

Flexible authentication and authorization: Pluggable Authentication Module (PAM) support enables PowerBroker for Unix & Linux to utilize industry-standard authentication systems.

Track and record activity: Time-stamped logs for every administrative, user-level, and application activity ensures that no suspicious activity goes unnoticed. DVR-style recording and indexing ensures all activity is available for quick discovery and playback.


Granular delegation of privileged accounts: Partitions privileged accounts such as root, granting users and admins access to only the specific entitlements required to perform a given task, achieving a least-privilege model.

Centralized administration and auditing: Greatly reduces the administration and overhead normally associated with policies and audit tasks.

Flexible policy language: Determines who can do what, where, when, and why providing granular options to the administrator.

Extensive platform support: Supports more than 100 flavors of Unix and Linux (full list).

User management: Granularly controls user access to programs, files, and directories as well as brokering system tasks, without sudo.

Database synchronization: Files and settings can be automatically replicated between hosts, saving time and effort by no longer requiring the manual copying of files between hosts.

Registry Name Service: Enables all PowerBroker components to centrally register themselves and provide a logical grouping (Service Groups). Makes adding, changing and removing servers within particular services types much easier while ensuring high availability needs are always met.


File Integrity Monitoring: Performs timed scans of centrally selected files and/or folders, checking the targets against a list of predefined settings including location, ownership, permissions, size, date/time and a file hash, ensuring files have not been tampered with.

Secure logging: Centralized log data facilitates controlled access to session activity information.

Encrypted: Supports 30 encryption methods for policies, logs, and network traffic, assuring compatibility within virtually any IT infrastructure. Ensures all user and admin activity are encrypted to selectable, industry-standard algorithms and stored in a secure, centralized location.

Reducing Insider Risks with PowerBroker for Unix & Linux Servers

1 Remove the Need to Login as Root

PowerBroker for Unix & Linux implements a true least privilege delegation model, allowing users to run any command at a higher privilege level so long as allowed by the centralized policy. Removing the need for users to logon as root allows the root user account to have much tighter security controls or be moved to a password management system such as PowerBroker Password Safe.

2 Achieve Compliance for Root

PowerBroker for Unix & Linux allows standard named user accounts to elevate to a root level with full session logging, providing a centralized indelible audit trail and ultimate accountability for each individual system administrator.

3 Make Up for sudo's Shortfalls

PowerBroker for Sudo provides a way to quickly and simply centralize one or more sudoers files. Connecting hosts can be optionally grouped or run in a hybrid of one to one plus grouped hosts, allowing simple and controlled access to specific sudoers files located on one or more centralized servers based on the requesting hosts group membership.

4 Seamlessly Integrate with Password Management

PowerBroker for Unix & Linux integrates seamlessly with PowerBroker Password Safe. This allows you to control both what users can access and what they can do once they have access.

Related Resources: Get the most out of PowerBroker for Unix & Linux