Welcome!

Python Authors: Pat Romanski, Jyoti Bansal, Donald Meyer, Liz McMillan, Elizabeth White

News Feed Item

Dell Extends Leadership in Privileged Account Management with Unified Security and Management Solution Set

As reports of corporate data breaches regularly surface, Dell Software is enabling IT to drive connected security across the organization, offering protection from the inside and the outside. Today, Dell announced the release of Quest One Privileged Access Suite for Unix, which combines Active Directory bridge and root delegation technologies to combat against poorly managed privileged accounts with a single, intuitive interface, to help protect the organization from the inside out.

Hackers increasingly are mounting targeted, purposeful attacks on company infrastructure. Reports abound of disgruntled employees who misuse their privileged access to steal sensitive company data and customer information, or cause havoc to the organization’s computer system. Unix systems, by their nature, have the potential for catastrophic security lapses, particularly in the hands of an unhappy employee. Organizations often have many Unix and Linux servers, each functioning independently and requiring its own management of the shared root account. Not only does this result in a disconnected collection of inconsistent controls that rely heavily on error-prone manual processes, but it also means that access to the root account for each system is gained through a password often shared among IT staff.

News Facts:

  • Dell Software has refocused the lens on security to establish a connected perimeter around the entire IT environment, offering protection from threats both external and internal. To help protect the organization from the inside out, Dell’s Quest One Privileged Access Suite for Unix unifies and consolidates identities across the entire environment, assigning individual accountability and enabling centralized reporting for Unix access.
  • Quest One Privileged Access Suite for Unix bundles three privileged account management solutions under a unified console designed to resolve the management and security shortcomings inherent in Unix.
    • Authentication Services is Dell’s AD bridge solution, which extends the security and compliance of Active Directory to Unix and Linux ─ along with Mac and many enterprise applications ─ and shares a powerful management interface and tight integration with both Quest One Privilege Manager for Unix and Quest One Privilege Manager for Sudo.
    • Quest One Privilege Manager for Unix is a replacement for sudo that provides fine-grained, policy-based control to protect the full power of root access from potential misuse or abuse, and helps define and enforce security policies stipulating who has access to which root function, as well as when and where individuals can perform those functions.
    • Quest One Privilege Manager for Sudo takes privileged account management using sudo to the next level, eliminating inefficient and inconsistent box-by-box management. Dell’s unique plug-ins can enhance sudo 1.8.1 (and newer) with a central policy server, centralized management of sudo and the sudoers’ policy file, and centralized reporting on sudoers access rights and activities, as well as keystroke logging of activities performed through sudo.
  • Quest One Privileged Access Suite for Unix gives IT a modular and integrated privileged account management solution with a unified single source of the truth for access across the entire Unix/Linux environment, using sudo or advanced delegation capabilities that best fit the organization’s needs.
  • Quest One Privileged Access Suite for Unix is available immediately, with North American pricing starting at $524USD* per server.

Supporting Quotes:

John Milburn, Executive Director, Identity and Access Management Solutions, Dell Software

“Poorly managed privileged accounts present one of the biggest security threats to an organization. This means that IT must broaden its security defense beyond a single inflection point, to drive protection from both the outside in and the inside out. The Quest One Privileged Access Suite for Unix offers a complete range of authentication, authorization and administration capabilities for Unix/Linux access that affords enterprise protection from the inside out.”

Tim Westcott, R&D Director, Preventia

“The Quest PAM solution is at the core of security solutions that we provide to our enterprise clients in the financial sector,” said Tim Westcott, R&D Director at Preventia. “Many of the UK’s largest financial organizations rely on our expertise and knowledge, and Quest has been our choice for clients requiring a comprehensive, world-class privileged access management solution for years.”

Scott Crawford, Enterprise Management Associates

“When incidents traceable to poor administrative access management occur, organizations should note that auditors, investigators and enforcers will be aware that privileged access management solutions exist to mitigate such risks. Today’s PAM solutions can address these gaps, but they can deliver much more. By supporting a more disciplined approach to IT control with a movement towards governance, they can also help organizations improve IT performance and reduce support costs by closing one of the most readily managed gaps of all: the weakness exposed when individuals have broad and unmonitored administrative access to the most sensitive capability in IT.”

Security Lapses by the Numbers

  • Every day, another company falls prey to a costly data breach. Often, these victims believe they have the correct security practices in place, yet they become pre-identified for attack or for easily exploitable weaknesses, both from inside, and without.
  • Despite 855 reported incidents and 174 million compromised records in 20121 alone, organizations are struggling to defend their perimeter against these new-world criminals.
  • A survey of 150 senior IT decision-makers conducted on behalf of Dell’s Quest Software revealed that:
    • Forty-six respondents have more than 100 privileged accounts in their organizations.
    • More than half of the respondents (53 percent) have more than 10 administrators who must access any of those accounts. More than a quarter of those (27 percent) share the passwords among 10 or more administrators.
    • Almost two-thirds of respondents do not have a high level of confidence that they can track administrative activity performed with shared credentials back to the individual administrator who performed them.

*Offers subject to change, not combinable with all other offers. Taxes, shipping, handling and other fees apply. Limit 5 discounted units or promotional items per customer. Dell reserves right to cancel orders arising from pricing or other errors.

1 Verizon 2012 Data BREACH Investigations Report

Supporting Resources:

About Dell

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com and www.quest.com.

Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.

Quest, Quest Software, and the Quest logo are trademarks or registered trademarks of Quest Software in the United States and certain other countries. All other names mentioned herein may be trademarks of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
SYS-CON Events announced today that IoT Now has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
SYS-CON Events announced today that WineSOFT will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Based in Seoul and Irvine, WineSOFT is an innovative software house focusing on internet infrastructure solutions. The venture started as a bootstrap start-up in 2010 by focusing on making the internet faster and more powerful. WineSOFT’s knowledge is based on the expertise of TCP/IP, VPN, SSL, peer-to-peer, mob...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
In his session at @ThingsExpo, Steve Wilkes, CTO and founder of Striim, will delve into four enterprise-scale, business-critical case studies where streaming analytics serves as the key to enabling real-time data integration and right-time insights in hybrid cloud, IoT, and fog computing environments. As part of this discussion, he will also present a demo based on its partnership with Fujitsu, highlighting their technologies in a healthcare IoT use-case. The demo showcases the tracking of patie...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
SYS-CON Events announced today that Cloud Academy will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloud Academy is the industry’s most innovative, vendor-neutral cloud technology training platform. Cloud Academy provides continuous learning solutions for individuals and enterprise teams for Amazon Web Services, Microsoft Azure, Google Cloud Platform, and the most popular cloud computing technologies. Ge...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.