According to the White House, strengthening the cybersecurity of federal networks, systems, and data is one of the most important challenges the United States faces as a nation.
Controlling, monitoring, and auditing privileged access is extremely important to accomplish this mission by mitigating the risks posed by insider threats, preventing data breaches, and meeting compliance requirements.
The government has implemented a wide variety of mandates and programs, such as FISMA, the Cybersecurity Strategy and Implementation Plan (CSIP), and the DoD Cyber culture and Compliance Initiative (DC3I) to protect information security assets.
Today, most agencies are using multiple disjointed tools that are costly to maintain and don’t integrate to provide the right information and insight on users and assets to successfully enable collaboration.
Therefore, it is getting more difficult for CISOs to assess their agencies’ risks and to determine how to allocate already-stretched resources.
A most troubling trend in widely publicized breaches of government information systems has been the misuse or exploitation of privileged accounts.
To mitigate the risks of breach through privileged accounts, organizations must be empowered to efficiently manage this access.
(The BeyondTrust PowerBroker Privileged Access Management Platform is a modular, integrated solution that provides visibility and control over all privileged accounts and users. Courtesy of BeyondTrust and Vimeo)
BeyondTrust PowerBroker for Unix and Linux allows IT organizations to efficiently delegate Unix and Linux privileges and authorization without disclosing passwords for root or other accounts, record all privileged sessions for audits—including keystroke information—and achieve privileged access control requirements without relying on native tools or sudo.
Benefits of BeyondTrust PowerBroker for Unix and Linux include:
- Enhanced security through fine-grained, policy-based control of privileged accounts
- Enables segregation of duties by compartmentalizing IT tasks
- Replaces, and simplifies migration from existing open-source tools such as sudo with a commercially supported solution
- Achieve policy driven command elevation and auditing—down to the system level—with no change to the user experience
- Enables compliance through keystroke logging and DVR-style recording of all activity performed by the user
- Centralize single pane of glass management
- Common Criteria Certified
(Enterprise passwords are the keys to your IT kingdom, and abuse or misuse of those credentials is the cause of most data breaches today. Courtesy of BeyondTrust and Vimeo)
PowerBroker enables organizations to improve server security while simplifying privileged access management deployments and reducing costs.
Forrester recently recognized BeyondTrust as Industry Leaders in their 2016 PIM Wave report.
PowerBroker privileged access management platform for Unix and Linux systems has received Common Criteria certification.
Achievement of this certification helps to assure that government agencies and global enterprises can confidently procure and use PowerBroker for Unix & Linux to secure their environments against the threat of privileged account compromise without the added cost and complexity of additional product testing.
Common Criteria is the foundation for the widest-available mutual international recognition of secure IT products. Its goals include improving the availability of security-enhanced IT products and supporting more efficient procurement of solutions.
(PowerBroker Endpoint Least Privilege closes security gaps left by other solutions, providing you with comprehensive visibility and control over user, account and system security. Courtesy of BeyondTrust and Vimeo)
The Leidos (formerly SAIC) Common Criteria Testing Laboratory conducted the testing of PowerBroker for Unix & Linux, and the National Information Assurance Partnership (NIAP), the United States approving authority, granted the Common Criteria certificate (# 10691) that became effective on August 30, 2016.
PowerBroker for Unix and Linux achieved protection profile certification in Enterprise Security Management—Policy Management Version 2.1, and U.S. Government Approved Protection Profile—Protection Profile for Enterprise Security Management-Access Control Version 2.1.
BeyondTrust is a global cyber security software company that helps organizations prevent cyber-attacks and unauthorized data access due to privilege abuse.
Our solutions give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Access Management and Vulnerability Management.
Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100.