How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)

Cover

Unix/Linux OS users have passionately embraced either implementing open source privileged identity management solutions (i.e., sudo), commercial solutions that are more user friendly, or not implementing anything at all. Though highly disputed, the fact of the matter is that both solution-types do work and both bring high-value depending upon the IT environment that it is managing.

This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. CISOs managing large IT environments, combined with the “many eyes” in the open source community, are consistently discovering that sudo creates security, compliance and productivity challenges to large enterprises seeking to protect critical assets. By stepping back and looking at the good, the bad and the ugly of the sudo solution, enterprises will learn that sudo represents an illusion of control over access to a company’s critical assets.

Vendor:
BeyondTrust Corporation
Posted:
21 May 2010
Published:
20 May 2010
Format:
PDF
Length:
12 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor