BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, market-leading privilege management solution that enables customers to effectively manage and control privileges across their Unix and Linux Systems and achieve zero trust. With the largest install base in the market, Privilege Management for Unix & Linux helps customers eliminate credential sharing, limit root access, and prevent and contain breaches – without hindering productivity and without relying on sudo or custom tools. Robust auditing capabilities, including keystroke logging and session recording, along with centralized management, allow for streamlined compliance and protection.
BeyondTrust Professional Services Privilege Management for Unix & Linux packages offer scalable services engagements, with a drive toward providing customers self-sufficiency at all points along the engagement. The outcomes you receive are rooted in our best practices and are delivered in several Tiers, each representing increasingly comprehensive solutions.
Delivers essential Privilege Management for Unix & Linux functionality and components for the endpoints in your estate, helping you to remove unrestricted root access and achieve least privilege. This includes setup of the BeyondInsight for Unix and Linux management platform, configuration of role-based and administrator policies, and setup of Solr keystroke log indexing.
Delivers expanded guidance on advanced use cases and integrations, helping you to better tailor Privilege Management for Unix & Linux for your organization and incorporate it into your existing security tech stack. This includes configuration of script-based policy and setup of integrations with BeyondInsight for Unix and Linux, as well as SIEM and ITSM integrations.
Delivers support for larger infrastructure deployments, helping large and complex organizations get up to speed fast with Privilege Management for Unix & Linux. This includes setup of added policy and log servers as well as customized configuration of file integrity monitoring functionality.
|Professional Services Criteria||Tier 1||Tier 2||Tier 3|
|Basic environment installation with distributed architecture||Yes||Yes||Yes|
|Multiple Policy and Log Servers (up to...)||2||2||4|
|Installation of BeyondInsight for Unix & Linux||Yes||Yes||Yes|
|Role based policy||Yes||Yes||Yes|
|Script based policy||Yes||Yes|
|File integrity monitoring||Yes|
|Professional Services Tasks|
|Installation of client and management components||Yes||Yes||Yes|
|Initial administrator policy and assignment||Yes||Yes||Yes|
|High availability architecture and setup of management components||Yes||Yes||Yes|
|Installation and integration of BeyondInsight (Up to 2 Appliances)||Yes||Yes|
|Integration into a supported SIEM Vendor||Yes||Yes|
|Installation of Solr for keystroke log indexing||Yes||Yes||Yes|
|Integration with a supported ticketing system||Yes||Yes|
|Training and Knowledge Transfer|
|Deployment summary document provided||Yes||Yes||Yes|
|Provide knowledge transfer for daily maintenance of the system||Yes||Yes||Yes|