Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Thycotic Announces Endpoint Privilege Management Solution for Unix/Linux

Thycotic, provider of privileged access management (PAM) solutions for more than 12,500 organizations worldwide, including 25 of the Fortune 100, announced new privilege management capabilities for workstations running Unix and Linux. The latest release of Thycotic’s Privilege Manager solution includes a Sudo plugin that saves Unix/Linux administrators time, while still providing granular control over privileged activities.

According to the Verizon 2020 Data Breach Investigations Report, eighty percent of breaches involve compromised credentials, making them one of the most common entry points for threats. Unix and Linux endpoints are typically the most valuable targets because they rely on “root” accounts, which provide unrestricted access to all commands, files, directories, and resources.

Recommended AI News: Crayon US Gains Microsoft Modern Workplace Unit from Strategic Partner

Until now, privilege security for Unix/Linux has been cumbersome and expensive to set up. Skilled administrators use Sudo commands to enforce a least privilege policy on Unix/Linux endpoints, which then must be maintained and updated on multiple, distributed systems. With the latest release of Thycotic’s Privilege Manager, enterprises can protect all critical IT systems, regardless of operating platform, with a central solution. Policies can be set to allow, deny, and elevate privileges when required. For IT operations and security teams, this means all endpoints and servers throughout an organization follow consistent least privilege and Zero Trust policies, which makes compliance easier to demonstrate.

Related Posts
1 of 40,706

Recommended AI News: Mindlance acquires Quintrix to expand its Workforce Solutions Offerings

“Some teams will always prefer Unix and Linux to Windows or Mac due to their flexibility as well as their open-source nature,” said Jai Dargan, Vice President of Product Management at Thycotic. “Security leaders need to include all types of IT systems and all parts of an organization in a common security strategy and ensure they follow security policies consistently. This is now possible by incorporating Unix/Linux security seamlessly into Privilege Manager.”

The latest version of Privilege Manager makes deployment even faster. In addition to the Unix/Linux plugin, it includes a new policy framework that can be enabled in seconds to remove local admin rights, as well as greater automation and enhancements to reporting.

Recommended AI News: TCP Launches Demand-Driven Scheduling Solution Built by Humanity

1 Comment
  1. Copper recycling center Copper scrap legal compliance Scrap metal shipment
    Copper cable scrapping, Metal scrap reclaiming facility, Scrap Copper recycling rates

Leave A Reply

Your email address will not be published.