Welcome!

Open Source Authors: Plutora Blog, Yeshim Deniz, Elizabeth White, Carmen Gonzalez, Liz McMillan

News Feed Item

Dell Extends Leadership in Privileged Account Management with Unified Security and Management Solution Set

As reports of corporate data breaches regularly surface, Dell Software is enabling IT to drive connected security across the organization, offering protection from the inside and the outside. Today, Dell announced the release of Quest One Privileged Access Suite for Unix, which combines Active Directory bridge and root delegation technologies to combat against poorly managed privileged accounts with a single, intuitive interface, to help protect the organization from the inside out.

Hackers increasingly are mounting targeted, purposeful attacks on company infrastructure. Reports abound of disgruntled employees who misuse their privileged access to steal sensitive company data and customer information, or cause havoc to the organization’s computer system. Unix systems, by their nature, have the potential for catastrophic security lapses, particularly in the hands of an unhappy employee. Organizations often have many Unix and Linux servers, each functioning independently and requiring its own management of the shared root account. Not only does this result in a disconnected collection of inconsistent controls that rely heavily on error-prone manual processes, but it also means that access to the root account for each system is gained through a password often shared among IT staff.

News Facts:

  • Dell Software has refocused the lens on security to establish a connected perimeter around the entire IT environment, offering protection from threats both external and internal. To help protect the organization from the inside out, Dell’s Quest One Privileged Access Suite for Unix unifies and consolidates identities across the entire environment, assigning individual accountability and enabling centralized reporting for Unix access.
  • Quest One Privileged Access Suite for Unix bundles three privileged account management solutions under a unified console designed to resolve the management and security shortcomings inherent in Unix.
    • Authentication Services is Dell’s AD bridge solution, which extends the security and compliance of Active Directory to Unix and Linux ─ along with Mac and many enterprise applications ─ and shares a powerful management interface and tight integration with both Quest One Privilege Manager for Unix and Quest One Privilege Manager for Sudo.
    • Quest One Privilege Manager for Unix is a replacement for sudo that provides fine-grained, policy-based control to protect the full power of root access from potential misuse or abuse, and helps define and enforce security policies stipulating who has access to which root function, as well as when and where individuals can perform those functions.
    • Quest One Privilege Manager for Sudo takes privileged account management using sudo to the next level, eliminating inefficient and inconsistent box-by-box management. Dell’s unique plug-ins can enhance sudo 1.8.1 (and newer) with a central policy server, centralized management of sudo and the sudoers’ policy file, and centralized reporting on sudoers access rights and activities, as well as keystroke logging of activities performed through sudo.
  • Quest One Privileged Access Suite for Unix gives IT a modular and integrated privileged account management solution with a unified single source of the truth for access across the entire Unix/Linux environment, using sudo or advanced delegation capabilities that best fit the organization’s needs.
  • Quest One Privileged Access Suite for Unix is available immediately, with North American pricing starting at $524USD* per server.

Supporting Quotes:

John Milburn, Executive Director, Identity and Access Management Solutions, Dell Software

“Poorly managed privileged accounts present one of the biggest security threats to an organization. This means that IT must broaden its security defense beyond a single inflection point, to drive protection from both the outside in and the inside out. The Quest One Privileged Access Suite for Unix offers a complete range of authentication, authorization and administration capabilities for Unix/Linux access that affords enterprise protection from the inside out.”

Tim Westcott, R&D Director, Preventia

“The Quest PAM solution is at the core of security solutions that we provide to our enterprise clients in the financial sector,” said Tim Westcott, R&D Director at Preventia. “Many of the UK’s largest financial organizations rely on our expertise and knowledge, and Quest has been our choice for clients requiring a comprehensive, world-class privileged access management solution for years.”

Scott Crawford, Enterprise Management Associates

“When incidents traceable to poor administrative access management occur, organizations should note that auditors, investigators and enforcers will be aware that privileged access management solutions exist to mitigate such risks. Today’s PAM solutions can address these gaps, but they can deliver much more. By supporting a more disciplined approach to IT control with a movement towards governance, they can also help organizations improve IT performance and reduce support costs by closing one of the most readily managed gaps of all: the weakness exposed when individuals have broad and unmonitored administrative access to the most sensitive capability in IT.”

Security Lapses by the Numbers

  • Every day, another company falls prey to a costly data breach. Often, these victims believe they have the correct security practices in place, yet they become pre-identified for attack or for easily exploitable weaknesses, both from inside, and without.
  • Despite 855 reported incidents and 174 million compromised records in 20121 alone, organizations are struggling to defend their perimeter against these new-world criminals.
  • A survey of 150 senior IT decision-makers conducted on behalf of Dell’s Quest Software revealed that:
    • Forty-six respondents have more than 100 privileged accounts in their organizations.
    • More than half of the respondents (53 percent) have more than 10 administrators who must access any of those accounts. More than a quarter of those (27 percent) share the passwords among 10 or more administrators.
    • Almost two-thirds of respondents do not have a high level of confidence that they can track administrative activity performed with shared credentials back to the individual administrator who performed them.

*Offers subject to change, not combinable with all other offers. Taxes, shipping, handling and other fees apply. Limit 5 discounted units or promotional items per customer. Dell reserves right to cancel orders arising from pricing or other errors.

1 Verizon 2012 Data BREACH Investigations Report

Supporting Resources:

About Dell

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com and www.quest.com.

Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.

Quest, Quest Software, and the Quest logo are trademarks or registered trademarks of Quest Software in the United States and certain other countries. All other names mentioned herein may be trademarks of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
SYS-CON Media announced that Splunk, a provider of the leading software platform for real-time Operational Intelligence, has launched an ad campaign on Big Data Journal. Splunk software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. The ads focus on delivering ROI - how improved uptime delivered $6M in annual ROI, improving customer operations by mining large volumes of unstructured data, and how data tracking delivers uptime when it matters most.
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immediate and actionable interpretation of events as they happen. Another aspect concerns how to deliver ...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
Code Halos - aka "digital fingerprints" - are the key organizing principle to understand a) how dumb things become smart and b) how to monetize this dynamic. In his session at @ThingsExpo, Robert Brown, AVP, Center for the Future of Work at Cognizant Technology Solutions, outlined research, analysis and recommendations from his recently published book on this phenomena on the way leading edge organizations like GE and Disney are unlocking the Internet of Things opportunity and what steps your organization should be taking to position itself for the next platform of digital competition.
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
Dale Kim is the Director of Industry Solutions at MapR. His background includes a variety of technical and management roles at information technology companies. While his experience includes work with relational databases, much of his career pertains to non-relational data in the areas of search, content management, and NoSQL, and includes senior roles in technical marketing, sales engineering, and support engineering. Dale holds an MBA from Santa Clara University, and a BA in Computer Science from the University of California, Berkeley.
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness, and in-car entertainment and this excitement will bleed into other areas. On the commercial side, m...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, discussed how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have s...
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use cases.
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.
“With easy-to-use SDKs for Atmel’s platforms, IoT developers can now reap the benefits of realtime communication, and bypass the security pitfalls and configuration complexities that put IoT deployments at risk,” said Todd Greene, founder & CEO of PubNub. PubNub will team with Atmel at CES 2015 to launch full SDK support for Atmel’s MCU, MPU, and Wireless SoC platforms. Atmel developers now have access to PubNub’s secure Publish/Subscribe messaging with guaranteed ¼ second latencies across PubNub’s 14 global points-of-presence. PubNub delivers secure communication through firewalls, proxy ser...
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focused on understanding how industrial data can create intelligence for industrial operations. Imagine ...