FoxT BoKS® ServerControl
Take control of your security.
FoxT BoKS® ServerControl transforms your multi-vendor server environment into one centrally managed domain. It simplifies your organization’s ability to enforce security policies and control access to critical systems and information. With controlled delegation of privileged accounts and control over privileged command execution, you can stop breaches before they start.
What we can help you do
    • Turn account administration into a simple, streamlined process
      User Provisioning
      Reduce the time and complexity of this process by centrally provisioning and de-provisioning user accounts across diverse UNIX, Linux and Windows servers.
      Group Management
      Decrease administrative overhead by centrally provisioning and de-provisioning groups across diverse server environments.
      Home Directories
      Centrally create and manage home directories and profiles to ensure consistency across diverse server environments.
      Password Mgmt
      Increase security and accountability by managing password quality, aging and history across accounts; and sync across server environments.
    • Centrally control your access for a more secure enterprise
      System Access
      Control SSH, telnet, ftp, r-commands, netshare, xdm, scp, sftp, remote exec; enabling you to deny access by default so that permission must be granted.
      Authentication
      Strengthen administrative access security with multiple forms of authentication such as password, token, SSH keys, and Kerberos.
      Authorization
      Gain control and heighten security by defining the whom, from where, when, what and how your servers are being accessed.
      Granular Controls
      Separate control of SSH based services and sub-protocols: SSH login, exec, scp, sftp, x11 tunneling and port forwarding – grant one without the other.
       
    • Protect your enterprise’s most sensitive data
      Least Privileged
      Enforce stronger security controls with centralized authorization of privileged activity.
      Simplify Sudo
      Reduce the time and complexity of sudo by centrally controlling su and sudo across diverse Linux and Unix server environments.
      Identification
      Increase security and accountability by granting and auditing privileged activity tied directly to a unique identity.
      No Shared Passwords
      Protect sensitive information by mitigating the sharing of accounts and passwords by granting privilege directly to user.
       
Lets build a more secure future together
When it comes to enterprise security, one size doesn’t fit all. It’s not just a question of what products or solutions are available; it’s which best fit your business needs, how well they can be integrated, and how effectively you adapt to future developments for a more secure enterprise. We want to know what can we do for you …We’re here to listen.
Resources
BoKS Specifications
BoKS ServerControl Detailed Specification Document. Download >>
PAM White Paper
Best Practices for Unix/Linux Privileged Identity and Access Mgmt. Download >>
Customer Case Study
Financial Institution Centralizes Access Controls Across 50,000 Servers. Download >>