Welcome!

Open Source Cloud Authors: Mamoon Yunus, Pat Romanski, Derek Weeks, Elizabeth White, Kevin Benedict

News Feed Item

Dell Extends Leadership in Privileged Account Management with Unified Security and Management Solution Set

As reports of corporate data breaches regularly surface, Dell Software is enabling IT to drive connected security across the organization, offering protection from the inside and the outside. Today, Dell announced the release of Quest One Privileged Access Suite for Unix, which combines Active Directory bridge and root delegation technologies to combat against poorly managed privileged accounts with a single, intuitive interface, to help protect the organization from the inside out.

Hackers increasingly are mounting targeted, purposeful attacks on company infrastructure. Reports abound of disgruntled employees who misuse their privileged access to steal sensitive company data and customer information, or cause havoc to the organization’s computer system. Unix systems, by their nature, have the potential for catastrophic security lapses, particularly in the hands of an unhappy employee. Organizations often have many Unix and Linux servers, each functioning independently and requiring its own management of the shared root account. Not only does this result in a disconnected collection of inconsistent controls that rely heavily on error-prone manual processes, but it also means that access to the root account for each system is gained through a password often shared among IT staff.

News Facts:

  • Dell Software has refocused the lens on security to establish a connected perimeter around the entire IT environment, offering protection from threats both external and internal. To help protect the organization from the inside out, Dell’s Quest One Privileged Access Suite for Unix unifies and consolidates identities across the entire environment, assigning individual accountability and enabling centralized reporting for Unix access.
  • Quest One Privileged Access Suite for Unix bundles three privileged account management solutions under a unified console designed to resolve the management and security shortcomings inherent in Unix.
    • Authentication Services is Dell’s AD bridge solution, which extends the security and compliance of Active Directory to Unix and Linux ─ along with Mac and many enterprise applications ─ and shares a powerful management interface and tight integration with both Quest One Privilege Manager for Unix and Quest One Privilege Manager for Sudo.
    • Quest One Privilege Manager for Unix is a replacement for sudo that provides fine-grained, policy-based control to protect the full power of root access from potential misuse or abuse, and helps define and enforce security policies stipulating who has access to which root function, as well as when and where individuals can perform those functions.
    • Quest One Privilege Manager for Sudo takes privileged account management using sudo to the next level, eliminating inefficient and inconsistent box-by-box management. Dell’s unique plug-ins can enhance sudo 1.8.1 (and newer) with a central policy server, centralized management of sudo and the sudoers’ policy file, and centralized reporting on sudoers access rights and activities, as well as keystroke logging of activities performed through sudo.
  • Quest One Privileged Access Suite for Unix gives IT a modular and integrated privileged account management solution with a unified single source of the truth for access across the entire Unix/Linux environment, using sudo or advanced delegation capabilities that best fit the organization’s needs.
  • Quest One Privileged Access Suite for Unix is available immediately, with North American pricing starting at $524USD* per server.

Supporting Quotes:

John Milburn, Executive Director, Identity and Access Management Solutions, Dell Software

“Poorly managed privileged accounts present one of the biggest security threats to an organization. This means that IT must broaden its security defense beyond a single inflection point, to drive protection from both the outside in and the inside out. The Quest One Privileged Access Suite for Unix offers a complete range of authentication, authorization and administration capabilities for Unix/Linux access that affords enterprise protection from the inside out.”

Tim Westcott, R&D Director, Preventia

“The Quest PAM solution is at the core of security solutions that we provide to our enterprise clients in the financial sector,” said Tim Westcott, R&D Director at Preventia. “Many of the UK’s largest financial organizations rely on our expertise and knowledge, and Quest has been our choice for clients requiring a comprehensive, world-class privileged access management solution for years.”

Scott Crawford, Enterprise Management Associates

“When incidents traceable to poor administrative access management occur, organizations should note that auditors, investigators and enforcers will be aware that privileged access management solutions exist to mitigate such risks. Today’s PAM solutions can address these gaps, but they can deliver much more. By supporting a more disciplined approach to IT control with a movement towards governance, they can also help organizations improve IT performance and reduce support costs by closing one of the most readily managed gaps of all: the weakness exposed when individuals have broad and unmonitored administrative access to the most sensitive capability in IT.”

Security Lapses by the Numbers

  • Every day, another company falls prey to a costly data breach. Often, these victims believe they have the correct security practices in place, yet they become pre-identified for attack or for easily exploitable weaknesses, both from inside, and without.
  • Despite 855 reported incidents and 174 million compromised records in 20121 alone, organizations are struggling to defend their perimeter against these new-world criminals.
  • A survey of 150 senior IT decision-makers conducted on behalf of Dell’s Quest Software revealed that:
    • Forty-six respondents have more than 100 privileged accounts in their organizations.
    • More than half of the respondents (53 percent) have more than 10 administrators who must access any of those accounts. More than a quarter of those (27 percent) share the passwords among 10 or more administrators.
    • Almost two-thirds of respondents do not have a high level of confidence that they can track administrative activity performed with shared credentials back to the individual administrator who performed them.

*Offers subject to change, not combinable with all other offers. Taxes, shipping, handling and other fees apply. Limit 5 discounted units or promotional items per customer. Dell reserves right to cancel orders arising from pricing or other errors.

1 Verizon 2012 Data BREACH Investigations Report

Supporting Resources:

About Dell

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com and www.quest.com.

Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.

Quest, Quest Software, and the Quest logo are trademarks or registered trademarks of Quest Software in the United States and certain other countries. All other names mentioned herein may be trademarks of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
From 2013, NTT Communications has been providing cPaaS service, SkyWay. Its customer’s expectations for leveraging WebRTC technology are not only typical real-time communication use cases such as Web conference, remote education, but also IoT use cases such as remote camera monitoring, smart-glass, and robotic. Because of this, NTT Communications has numerous IoT business use-cases that its customers are developing on top of PaaS. WebRTC will lead IoT businesses to be more innovative and address...
In his session at @ThingsExpo, Sudarshan Krishnamurthi, a Senior Manager, Business Strategy, at Cisco Systems, discussed how IT and operational technology (OT) work together, as opposed to being in separate siloes as once was traditional. Attendees learned how to fully leverage the power of IoT in their organization by bringing the two sides together and bridging the communication gap. He also looked at what good leadership must entail in order to accomplish this, and how IT managers can be the ...
SYS-CON Events announced today that Secure Channels, a cybersecurity firm, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Secure Channels, Inc. offers several products and solutions to its many clients, helping them protect critical data from being compromised and access to computer networks from the unauthorized. The company develops comprehensive data encryption security strategie...
"DX encompasses the continuing technology revolution, and is addressing society's most important issues throughout the entire $78 trillion 21st-century global economy," said Roger Strukhoff, Conference Chair. "DX World Expo has organized these issues along 10 tracks with more than 150 of the world's top speakers coming to Istanbul to help change the world."
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, discussed the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information.
SYS-CON Events announced today that App2Cloud will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. App2Cloud is an online Platform, specializing in migrating legacy applications to any Cloud Providers (AWS, Azure, Google Cloud).
SYS-CON Events announced today that Calligo has been named “Bronze Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Calligo is an innovative cloud service provider offering mid-sized companies the highest levels of data privacy. Calligo offers unparalleled application performance guarantees, commercial flexibility and a personalized support service from its globally located cloud platform...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. Jack Norris reviews best practices to show how companies develop, deploy, and dynamically update these applications and how this data-first...
Intelligent Automation is now one of the key business imperatives for CIOs and CISOs impacting all areas of business today. In his session at 21st Cloud Expo, Brian Boeggeman, VP Alliances & Partnerships at Ayehu, will talk about how business value is created and delivered through intelligent automation to today’s enterprises. The open ecosystem platform approach toward Intelligent Automation that Ayehu delivers to the market is core to enabling the creation of the self-driving enterprise.
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, shared examples from a wide range of industries – including en...
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...
"The Striim platform is a full end-to-end streaming integration and analytics platform that is middleware that covers a lot of different use cases," explained Steve Wilkes, Founder and CTO at Striim, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that IBM has been named “Diamond Sponsor” of SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California.
SYS-CON Events announced today that Massive Networks will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Massive Networks mission is simple. To help your business operate seamlessly with fast, reliable, and secure internet and network solutions. Improve your customer's experience with outstanding connections to your cloud.
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution and join Akvelon expert and IoT industry leader, Sergey Grebnov, in his session at @ThingsExpo, for an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, will examine the regulations and provide insight on how it affects technology, challenges the established rules and will usher in new levels of diligence a...