with Colin Bretagne, Senior Product Manager; Hassane Sennouni, Sr Product Marketing Manager
BeyondTrust Privilege Management for Unix & Linux (PMUL) is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance, control privileged access, and prevent and contain breaches that can affect Unix & Linux systems—without hurting productivity.
BeyondTrust Active Directory Bridge (ADB) centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending Group Policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment.
The Unix/Linux Privilege Management Platform (BIUL) is the industry’s most innovative and comprehensive privileged access management platform. The platform maximizes visibility, simplifies deployment, automates tasks, improves security, and reduces privilege-related risks.
Join us as the BeyondTrust Product Management team will take you through the new features and exciting improvements to BeyondTrust’s best in class Privilege Management for Unix & Linux solution.
Learn how to leverage and adopt NEW features like:
Live Q & A with our Sr Product Manager, Colin Bretagne and Sr Product Marketing Manager, Hassane Sennouni
Originally from South Africa, Colin has worked and lived in 3 countries. Through his career, he has worked his way from a Support Engineer to a Technical Manager, before arriving in Montreal Canada in 2009. Colin has extensive experience in hardware and software and has achieved certifications in HP, Novell, Microsoft, Linux, and Pragmatic Marketing. In his spare time, Colin enjoys Rugby, Judo, and is a qualified FA Soccer referee.
Hassane is a seasoned information security professional based in Paris, France. He holds a Telecommunications and Network Engineering degree and an Executive MBA, and he is also a CISSP certified. He has extensive experience managing and implementing cybersecurity programs across various industries.