How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)

Cover

Unix/Linux OS users have passionately embraced either implementing open source privileged identity management solutions (i.e., sudo), commercial solutions that are more user friendly, or not implementing anything at all. Though highly disputed, the fact of the matter is that both solution-types do work and both bring high-value depending upon the IT environment that it is managing.

This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. CISOs managing large IT environments, combined with the “many eyes” in the open source community, are consistently discovering that sudo creates security, compliance and productivity challenges to large enterprises seeking to protect critical assets. By stepping back and looking at the good, the bad and the ugly of the sudo solution, enterprises will learn that sudo represents an illusion of control over access to a company’s critical assets.

Vendor:
BeyondTrust Corporation
Posted:
21 May 2010
Published:
20 May 2010
Format:
PDF
Length:
12 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy