Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreWatch the replays from our 2023 conference now!
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
, –pm with Nick Cavalancia, Founder/Chief, Techvangelism
As organizations move critical parts of operations to the cloud, the use of cloud-based Linux workloads continues to increase. The heavy reliance on Linux, matched with the reduction in visibility and control when moving workloads to the cloud has resulted in threat actors realizing the great potential these internet-facing systems have to become a malicious asset during a cyberattack.
Linux and the applications that run on it are seemingly no less vulnerable than their Windows counterparts; there are plenty of unpatched critical and zero-day vulnerabilities to go around, making Linux as much a target as any other workload in the cloud. In 2021, Linux-based workloads have experienced being the target of coin miners, those seeking access through web shells or trojans, and extortion via ransomware, making it imperative to protect these workloads.
In this real-training-for-free on-demand session, Microsoft MVP and cybersecurity expert Nick Cavalancia takes my seat and will take a closer look at specific aspects of the Linux environment threat actors take advantage of, including:
Nick is then joined by Colin Bretagne, Senior Product Manager and Patrick Schneider, Senior Solutions Architect from BeyondTrust who discuss and then show real-world examples of how to ensure that your Linux environments in the cloud are secure through:
As your Linux workloads get moved to the cloud, these core workload protection strategies help your security and IT teams achieve compliance, control root access, and prevent and contain breaches that can affect the Unix and Linux systems across your organization.
Nick Cavalancia has over 20 years of enterprise IT experience, 10 years as a tech marketing executive and is an accomplished technology writer, consultant, trainer, speaker, and columnist.
Nick has attained industry certifications including MCNE, MCNI, MCSE and MCT and was once accused at TechEd of "not having enough digits" in his MCP number (which only has 5). He has authored, co-authored and contributed to over a dozen books on Windows, Active Directory, Exchange and other Microsoft technologies and has spoken at many technical conferences on a wide variety of topics.
Previously, Nick has held executive marketing positions at ScriptLogic (acquired by Quest, now DELL Software), SpectorSoft and Netwrix where he was responsible for the global messaging, branding, lead generation and demand generation strategies to market technology solutions to an IT-centric customer base.
Patrick Schneider is a Senior IGA professional, with 30 years of experience in the Information Technology industry. Prior to joining BeyondTrust as a Senior Solutions Architect, Patrick was a Senior Solutions Engineer for the Security portfolio of a major IAM solutions provider. Patrick holds many industry certifications such as Comptia+, MCP, Certified Directory Engineer, Certified Linux Engineer and more.
Originally from South Africa, Colin has worked and lived in 3 countries. Through his career, he has worked his way from a Support Engineer to a Technical Manager, before arriving in Montreal Canada in 2009. Colin has extensive experience in hardware and software and has achieved certifications in HP, Novell, Microsoft, Linux, and Pragmatic Marketing. In his spare time, Colin enjoys Rugby, Judo, and is a qualified FA Soccer referee.