Integrating Password and Privilege Management for Unix and Linux Systems

KuppingerCole Recommends a Holistic Privilege Management Approach to Address Internal and External Threats

Published October 2019


Unix and Linux build the foundation for most business-critical systems. Thus, they present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, security teams must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.

  • Download this whitepaper to learn discover:
  • Why PAM strategies must focus on both limiting privileged access and avoiding the sprawl of passwords;
  • Why Integrating Shared Account Password Management (SAPM) and Controlled Privileged Elevation and Delegation Management (CPEDM) is a must for covering the most challenging PAM threats;
  • The specific challenges that Unix and Linux systems pose that distinguish these environments from other widely used platforms.

You will have to register, or log in, in order to download this paper.

Biting the hand that feeds IT © 1998–2019