FoxT BoKS® ServerControl
Take control of your security.FoxT BoKS® ServerControl transforms your multi-vendor server environment into one centrally managed domain. It simplifies your organization’s ability to enforce security policies and control access to critical systems and information. With controlled delegation of privileged accounts and control over privileged command execution, you can stop breaches before they start.
What we can help you do
Turn account administration into a simple, streamlined processUser ProvisioningReduce the time and complexity of this process by centrally provisioning and de-provisioning user accounts across diverse UNIX, Linux and Windows servers.Group ManagementDecrease administrative overhead by centrally provisioning and de-provisioning groups across diverse server environments.Home DirectoriesCentrally create and manage home directories and profiles to ensure consistency across diverse server environments.Password MgmtIncrease security and accountability by managing password quality, aging and history across accounts; and sync across server environments.
Centrally control your access for a more secure enterpriseSystem AccessControl SSH, telnet, ftp, r-commands, netshare, xdm, scp, sftp, remote exec; enabling you to deny access by default so that permission must be granted.AuthenticationStrengthen administrative access security with multiple forms of authentication such as password, token, SSH keys, and Kerberos.AuthorizationGain control and heighten security by defining the whom, from where, when, what and how your servers are being accessed.Granular ControlsSeparate control of SSH based services and sub-protocols: SSH login, exec, scp, sftp, x11 tunneling and port forwarding – grant one without the other.
Protect your enterprise’s most sensitive dataLeast PrivilegedEnforce stronger security controls with centralized authorization of privileged activity.Simplify SudoReduce the time and complexity of sudo by centrally controlling su and sudo across diverse Linux and Unix server environments.IdentificationIncrease security and accountability by granting and auditing privileged activity tied directly to a unique identity.No Shared PasswordsProtect sensitive information by mitigating the sharing of accounts and passwords by granting privilege directly to user.
Lets build a more secure future together
When it comes to enterprise security, one size doesn’t fit all. It’s not just a question of what products or solutions are available; it’s which best fit your business needs, how well they can be integrated, and how effectively you adapt to future developments for a more secure enterprise. We want to know what can we do for you …We’re here to listen.