|By Business Wire||
|February 26, 2013 08:16 AM EST||
As reports of corporate data breaches regularly surface, Dell Software is enabling IT to drive connected security across the organization, offering protection from the inside and the outside. Today, Dell announced the release of Quest One Privileged Access Suite for Unix, which combines Active Directory bridge and root delegation technologies to combat against poorly managed privileged accounts with a single, intuitive interface, to help protect the organization from the inside out.
Hackers increasingly are mounting targeted, purposeful attacks on company infrastructure. Reports abound of disgruntled employees who misuse their privileged access to steal sensitive company data and customer information, or cause havoc to the organization’s computer system. Unix systems, by their nature, have the potential for catastrophic security lapses, particularly in the hands of an unhappy employee. Organizations often have many Unix and Linux servers, each functioning independently and requiring its own management of the shared root account. Not only does this result in a disconnected collection of inconsistent controls that rely heavily on error-prone manual processes, but it also means that access to the root account for each system is gained through a password often shared among IT staff.
- Dell Software has refocused the lens on security to establish a connected perimeter around the entire IT environment, offering protection from threats both external and internal. To help protect the organization from the inside out, Dell’s Quest One Privileged Access Suite for Unix unifies and consolidates identities across the entire environment, assigning individual accountability and enabling centralized reporting for Unix access.
Quest One Privileged Access Suite for Unix bundles three
privileged account management solutions under a unified console
designed to resolve the management and security shortcomings inherent
- Authentication Services is Dell’s AD bridge solution, which extends the security and compliance of Active Directory to Unix and Linux ─ along with Mac and many enterprise applications ─ and shares a powerful management interface and tight integration with both Quest One Privilege Manager for Unix and Quest One Privilege Manager for Sudo.
- Quest One Privilege Manager for Unix is a replacement for sudo that provides fine-grained, policy-based control to protect the full power of root access from potential misuse or abuse, and helps define and enforce security policies stipulating who has access to which root function, as well as when and where individuals can perform those functions.
- Quest One Privilege Manager for Sudo takes privileged account management using sudo to the next level, eliminating inefficient and inconsistent box-by-box management. Dell’s unique plug-ins can enhance sudo 1.8.1 (and newer) with a central policy server, centralized management of sudo and the sudoers’ policy file, and centralized reporting on sudoers access rights and activities, as well as keystroke logging of activities performed through sudo.
- Quest One Privileged Access Suite for Unix gives IT a modular and integrated privileged account management solution with a unified single source of the truth for access across the entire Unix/Linux environment, using sudo or advanced delegation capabilities that best fit the organization’s needs.
- Quest One Privileged Access Suite for Unix is available immediately, with North American pricing starting at $524USD* per server.
John Milburn, Executive Director, Identity and Access Management Solutions, Dell Software
“Poorly managed privileged accounts present one of the biggest security threats to an organization. This means that IT must broaden its security defense beyond a single inflection point, to drive protection from both the outside in and the inside out. The Quest One Privileged Access Suite for Unix offers a complete range of authentication, authorization and administration capabilities for Unix/Linux access that affords enterprise protection from the inside out.”
Tim Westcott, R&D Director, Preventia
“The Quest PAM solution is at the core of security solutions that we provide to our enterprise clients in the financial sector,” said Tim Westcott, R&D Director at Preventia. “Many of the UK’s largest financial organizations rely on our expertise and knowledge, and Quest has been our choice for clients requiring a comprehensive, world-class privileged access management solution for years.”
Scott Crawford, Enterprise Management Associates
“When incidents traceable to poor administrative access management occur, organizations should note that auditors, investigators and enforcers will be aware that privileged access management solutions exist to mitigate such risks. Today’s PAM solutions can address these gaps, but they can deliver much more. By supporting a more disciplined approach to IT control with a movement towards governance, they can also help organizations improve IT performance and reduce support costs by closing one of the most readily managed gaps of all: the weakness exposed when individuals have broad and unmonitored administrative access to the most sensitive capability in IT.”
Security Lapses by the Numbers
- Every day, another company falls prey to a costly data breach. Often, these victims believe they have the correct security practices in place, yet they become pre-identified for attack or for easily exploitable weaknesses, both from inside, and without.
- Despite 855 reported incidents and 174 million compromised records in 20121 alone, organizations are struggling to defend their perimeter against these new-world criminals.
A survey of 150 senior IT decision-makers conducted on behalf of
Dell’s Quest Software revealed that:
- Forty-six respondents have more than 100 privileged accounts in their organizations.
- More than half of the respondents (53 percent) have more than 10 administrators who must access any of those accounts. More than a quarter of those (27 percent) share the passwords among 10 or more administrators.
- Almost two-thirds of respondents do not have a high level of confidence that they can track administrative activity performed with shared credentials back to the individual administrator who performed them.
*Offers subject to change, not combinable with all other offers. Taxes, shipping, handling and other fees apply. Limit 5 discounted units or promotional items per customer. Dell reserves right to cancel orders arising from pricing or other errors.
1 Verizon 2012 Data BREACH Investigations Report
- Quest Software, Inc.: http://www.quest.com/
- More Quest news: http://www.quest.com/newsroom/
- Twitter: http://mobile.twitter.com/quest
- Facebook: http://www.quest.com/facebook
- LinkedIn: http://www.linkedin.com/
- Quest TV: http://www.quest.com/tv/
- TechValidate Research: http://www.techvalidate.com/product-research/quest-iam
Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.
Quest, Quest Software, and the Quest logo are trademarks or registered trademarks of Quest Software in the United States and certain other countries. All other names mentioned herein may be trademarks of their respective owners.
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Oct. 1, 2016 07:00 AM EDT Reads: 1,864
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Oct. 1, 2016 06:15 AM EDT Reads: 806
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Oct. 1, 2016 06:00 AM EDT Reads: 1,944
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Oct. 1, 2016 05:45 AM EDT Reads: 1,341
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Oct. 1, 2016 05:30 AM EDT Reads: 641
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Oct. 1, 2016 05:15 AM EDT Reads: 1,437
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Oct. 1, 2016 05:00 AM EDT Reads: 4,755
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
Oct. 1, 2016 04:45 AM EDT Reads: 578
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Oct. 1, 2016 04:30 AM EDT Reads: 1,820
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Oct. 1, 2016 04:00 AM EDT Reads: 5,485
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
Oct. 1, 2016 04:00 AM EDT Reads: 1,658
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Oct. 1, 2016 04:00 AM EDT Reads: 3,129
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Oct. 1, 2016 03:00 AM EDT Reads: 1,979
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Oct. 1, 2016 03:00 AM EDT Reads: 2,460
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Oct. 1, 2016 02:30 AM EDT Reads: 2,719
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
Oct. 1, 2016 02:30 AM EDT Reads: 691
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Oct. 1, 2016 02:15 AM EDT Reads: 763
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Oct. 1, 2016 02:15 AM EDT Reads: 2,158
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Oct. 1, 2016 02:15 AM EDT Reads: 556
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Oct. 1, 2016 01:45 AM EDT Reads: 538