Symark Announces PowerBroker 5.0

Symark announced PowerBroker 5.0, a solution for authorization and access control within heterogeneous UNIX/Linux IT environments

May 8, 2007

2 Min Read
NetworkComputing logo in a gray background | NetworkComputing

AGOURA HILLS, Calif. -- Symark Software, the leading provider of UNIX and Linux security administration solutions, today announced PowerBroker 5.0, the industry's most complete solution for authorization and access control within heterogeneous UNIX/Linux IT environments. PowerBroker 5.0 now includes entitlement reporting capabilities that provide a detailed list of the commands that IT administrators and other users can run, on what systems and when. The new product also incorporates an access control list feature that simplifies the designation of access rights without requiring lengthy policies to be written. PowerBroker 5.0 helps organizations comply with PCI DSS, SOX, HIPAA and other regulations by enabling security managers to more easily grant selective administrative privileges while safeguarding the root password and controlling access to applications/commands, directories/files and permissions on various administrative tasks.

PowerBroker protects the root or 'superuser' account from internal exploitation by a rogue employee or a hacker that has breached the network. By granularly delegating what tasks can be performed as the root password and by whom, PowerBroker helps prevent the alteration or deletion of critical system files, unauthorized access of confidential data and the deletion of logged events and audit trails. PowerBroker protects the root account by granularly binding specific root-level tasks to UNIX/Linux user IDs so that the root password does not need to be disclosed to operators and systems administrators. Totally non-intrusive and non-disruptive to the operating system, the program reduces the risk of accidental damage, theft of digital assets, or malicious activities.

The new entitlement reporting functionality included in PowerBroker 5.0 lists the commands that systems administrators and other users are authorized to execute (including any constraints applied to their access privileges), thus demonstrating to auditors the enforcement of segregation of duties and that steps are being taken to create a secure access control infrastructure.

Symark Software

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights