How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)


Unix/Linux OS users have passionately embraced either implementing open source privileged identity management solutions (i.e., sudo), commercial solutions that are more user friendly, or not implementing anything at all. Though highly disputed, the fact of the matter is that both solution-types do work and both bring high-value depending upon the IT environment that it is managing.

This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. CISOs managing large IT environments, combined with the “many eyes” in the open source community, are consistently discovering that sudo creates security, compliance and productivity challenges to large enterprises seeking to protect critical assets. By stepping back and looking at the good, the bad and the ugly of the sudo solution, enterprises will learn that sudo represents an illusion of control over access to a company’s critical assets.

BeyondTrust Corporation
21 May 2010
20 May 2010
12 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.