Learn how One Identity Privileged Management Solutions simplify privileged account management, and let you enable privileged access without putting your entire organization at risk.
Role-based Root and Administrative Account Delegation:
Privilege Manager for Unix enables you to delegate root-account administrative privileges based on individual roles and rights without revealing the root account credentials. Plus, with Privilege Manager you can easily handle third-party applications management, including Oracle and SAP.
Comprehensive Policy Creation and Testing
Privilege Manager for Unix enables you to import third-party policies, as well as build new policies based on user, groups, commands, hosts, time of day, day of the week — and test the impact of those policies before pushing to a production environment.
Secure Centralized Management
Privilege Manager for Unix configuration and management is delivered througha GUI and/orvia command line. Its architecture is fully fault-tolerant withfailover and load-balancing options. Moreover, Privilege Manager encrypts its network traffic andintegrates with Pluggable Authentication Modules for increased security.
Indelible Audit Trail
Privilege Manager’s AuditLogger tracks who has been accessing whichsystems, what commands they executed, what changes they attempted to make to key files and data and ifthey were successful.
Encryption, Authentication and Program Controls
Encrypts network traffic, preventing the storage or execution of unauthorized or destructive programs on your UNIX systems.
Central Management of Heterogeneous Networks
Enjoy a single management interface and full functionality for your multi-platform/OS environment, includingIBM AIX, HP-UX, Sun, SuSE Linux, RedHat Linux, and more.
Before installing Privilege Manager for UNIX 6.0, ensure your system meets the following minimum hardware and software requirements:
|Operating System||Supported Version|
Enterprise Linux 5 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
Enterprise Linux 6 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
Enterprise Linux 7 (Intel x86/x86 64)
CentOS 5, 6, and 7 (Intel x86/x86 64)
16,17, and 18 (Intel x86/x86 64)
OpenSUSE 10 and 11 (Intel x86/x86 64)
Enterprise Desktop 10 and 11 (Intel x86/x86 64)
Enterprise Server 10 and 11 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
Debian GNU/Linux 6 (Intel x86/x86 64)
Ubuntu 10.04 LTS, 11.10, 12.04, 12.10 (Intel x86/x86 64)
Oracle Linux 5, 6, and 7 (Intel x86/x86 64)
Oracle VM 2
XenServer 5.6 and 6.0
|VMware ESX Server|
vSphere (ESX 4.0 and 4.1)
|Sun® Solaris||8, 9, 10, 11 11/11, and 11.1 (SPARC 32/64 bit / Intel x86/x86 64)|
11.11, 11.23, 11.31 (PA-RISC 32/64 bit)
11.22, 11.23, 11.31 (IA64 32/64 bit)
|IBM® AIX||5.3, 6.1, and 7.1 (32/64 bit)|
How can your organization be extremely secure, yet still fail miserably at compliance? Discover why implementing the necessary controls aren’t enough—you have to prove your compliance.
This white paper from The SANS Institute, addresses the issue of managing privileged accounts and offers advice on how to move toward better centralization of privileged account management.
Effectively managing privileged accounts is becoming more and more critical as security and compliance emerge as the driving force behind most IT initiatives. Unfortunately, native tools and manual practices for privileged account management are proving to be inadequate for today's complex heterogeneous enterprise. This white paper explores the
How to develop a three-step plan to stop evil doers from appropriating privileged accounts and damaging your agency. Dell One Identity privileged account management solutions help make you more safe.
Privilege Manager safely delegates administrative privileges, including root, and works to protect heterogeneous Unix systems from the threat of external attackers, as well as abuse and misuse from trusted internal users. This document addresses the security return on investment (ROI) of using Quest Software’s Privilege Manager for Unix
Ignoring the privileged account password vulnerability just won’t cut it anymore. Receive a roadmap to a simple and secure way to manage access.
How to control and audit superuser access - On the board
Solve security and administration issues inherent in Unix-based systems while achieving compliance
Extend the compliance and security of Active Directory to your enterprise
Enhance Sudo 1.8.1 with a central policy server, centralized sudo management and reporting
Manage two-factor authentication for storage and proprietary databases