FoxT Solutions
Gain Control with FoxT Access Management & Governance
FoxT Access Management & Governance solutions complement your existing technologies by adding granular control and enforcement of authentication and authorization policies for both privileged and end users. They help you centrally manage and enforce access polices across physical and virtual Unix, Linux and Windows servers.
  • Protecting Your Enterprise’s Most Sensitive Data
    Stop Breaches Before They Start
    Having trouble defining, controlling and monitoring administrative privileges across your IT systems? If so, you’re not alone. Most operating system and database shared functional accounts provide unrestricted, untraceable access, making privileged account management very difficult. Windows adds its own issues, since local administrator accounts on each system can be easily activated by support staff, exposing your business and customer data to theft or attack. FoxT BoKS ServerControl solves these issues by centrally controlling privileged account delegation and enforcing which commands can be executed by role. It eliminates privileged password sharing to significantly reduce the risk of insider fraud.
    privilaged access
    How We Help You Gain Control
    Define and enforce who is granted elevated privilege, when, from where, and how
    Require context driven authentication
    Vary authentication based on who, what, when and where
    Require users to log in using their own password or token, and elevate privilege without a shared password
    Control which commands can be executed by privileged users, and audit privileged activity
    Granular delegation of privilege
    Assign command sets instead of giving root
    Centrally manage sudo
    What This Means to You
    Quickly Meet Compliance:

    Quickly meet access/authorization regulations as described in SOX, HIPAA, GLBA, PCI DSS, FDCC and FISMA.

    Reduce Admin Overhead:

    The centralization of policy and audit data reduces the administrative overhead normally associated with these tasks.

    Prevent Breaches:

    Define the who can do what, from where, when, and how to ensure stronger security that prevents breaches before they start

    Lets build a more secure future together
    When it comes to enterprise security, one size doesn’t fit all. It’s not just a question of what products or solutions are available; it’s which best fit your business needs, how well they can be integrated, and how effectively you adapt to future developments for a more secure enterprise. We want to know what can we do for you …We’re here to listen.
  • Streamline IT Security Audits and Compliance Reporting
    Take Control of Compliance Reporting, and Get Rid of the Headache
    Are you spending too much time getting your environment through IT security audits, PCI reporting and SOX reporting? Can you truly enforce who can access which servers and what they can do when they get there? Are you controlling privileged user access rights and eliminating root and functional account password sharing? Can you track the access and activity of individual administrators? FoxT BoKS ServerControl can do all of this and more. Enforce compliance for users and administrators by controlling each individual’s access to Unix, Linux and Windows servers. You can automatically consolidate user activity logs and produce compliance-specific reports.
    compliance
    How We Help You Gain Control
    Eliminate privileged account password sharing to reduce the risk of insider fraud
    Centrally manage and enforce role-based authorization and authentication policies
    Automatically consolidate privileged user access data and keystroke logs across diverse server platforms
    Create turnkey IT security audit and compliance-specific reports
    What This Means to You
    Quickly Meet Compliance:

    Quickly meet reporting requirements and regulations as described in SOX, HIPAA, GLBA, PCI DSS, FDCC and FISMA.

    Reduce Admin Overhead:

    The centralization of policy and audit data reduces the administrative overhead normally associated with these tasks.

    Prevent Breaches:

    Define the who can do what, from where, when, and how to ensure stronger security that prevents breaches before they start.

    Lets build a more secure future together
    When it comes to enterprise security, one size doesn’t fit all. It’s not just a question of what products or solutions are available; it’s which best fit your business needs, how well they can be integrated, and how effectively you adapt to future developments for a more secure enterprise. We want to know what can we do for you …We’re here to listen.
  • Migrate to More Secure, Automated Privilege Access Control
    Sudo Migration Made Simple
    Sudo’s “free” open-source access utility can work for managing access to a few servers. However, it quickly becomes overwhelming as you grow and require more sophisticated fine-grain controls, logging and compliance-reporting capabilities. Sudo’s labor-intensive custom configuration and distribution process results in high administrative costs and serious gaps in access control and compliance. FoxT BoKS ServerControl solves these issues by centrally controlling privileged account delegation and enforcing which commands can be executed by role. It eliminates privileged password sharing to significantly reduce the risk of insider fraud. The solution? Uninstall Sudo and migrate to our centrally managed FoxT BoKS ServerControl.
    sudo
    How We Help You Gain Control
    Avoid Sudo’s static-trust model to satisfy auditors
    Centrally administer and enforce access policies
    Eliminate the risk of Sudo configuration file modification
    Automatically consolidate user activity and keystroke logs and automate regulatory compliance reporting
    Privileged user authentication based on context
    Centrally define which commands and options are available to specific users or administrators on specific servers
    What This Means to You
    Quickly Meet Compliance:

    Quickly meet access/authorization regulations as described in SOX, HIPAA, GLBA, PCI DSS, FDCC and FISMA.

    Reduce Admin Overhead:

    The centralization of policy and audit data greatly reduces the administration and overhead normally associated with these tasks.

    Prevent Breaches:

    Define the who can do what, from where, when, and how to ensure stronger security that prevents breaches before they start.

    Lets build a more secure future together
    When it comes to enterprise security, one size doesn’t fit all. It’s not just a question of what products or solutions are available; it’s which best fit your business needs, how well they can be integrated, and how effectively you adapt to future developments for a more secure enterprise. We want to know what can we do for you …We’re here to listen.
  • Don’t Manage SSH, Control it and Stop Breaches Before They Start
    Are you in control of your SSH?
    The problem: Many organizations are utilizing SSH to better secure their critical data and applications. To utilize SSH, the organization must create a new key pair for every new application, user, and automated service account. The challenge is that over time, thousands of SSH user and host key ‘pairs’ are created, but it is unclear as to what they are used for, or on which system. And while, key pairs should be updated at least every two years, it is extremely difficult, and organizations are reluctant to retire keys because it is nearly impossible to determine if they are still in use out of the thousands they have installed. FoxT BoKS ServerControl is utilized by both multi-national enterprises that must comply with stringent compliance regimes, and small start-up companies that have commercial and customer confidential data that will allow them to succeed and grow. It specifically protects you from the shortcomings of standard SSH software.
    ssh
    How We Help You Gain Control
    Centralizing user management in one place. If staff member leaves, any accounts, passwords, keys, and roles can be switched off immediately
    Create meaningful business and technical roles which provide sensible connection points to attach SSH access policies, rather than with individual users
    Define which keys are used where for SSH sessions, and how keys are automatically made available and used for user sessions, without assigning staff to handle SSH key distribution as an ongoing administration burden
    Centralize all SSH authentication methods
    Enforce which of ALL the SSH protocol “doors” can be used, and where
    Log all sessions centrally
    Stop you from needing external scanning tools, to “discover” historical SSH keys widely distributed across your infrastructure. If your organization has been in place for a while, expunging that stuff manually can be expensive. If the key is not registered with FoxT BoKS ServerControl, and associated with the correct user and “door” it cannot be used – period
    Avoid using policies defined by mal-configured local SSH configuration files, or files that have been purposely tampered with by your staff or technical support partners
    With “locks” on all the “doors”, and keys only being used in the right places at the right times you are sure you are taking centralized control of SSH
    What This Means to You
    Quickly Meet Compliance:

    Quickly meet access/authorization regulations as described in SOX, HIPAA, GLBA, PCI DSS, FDCC and FISMA.

    Reduce Admin Overhead:

    The centralization of policy and audit data greatly reduces the administration and overhead normally associated with these tasks.

    Prevent Breaches:

    Define the who can do what, from where, when, and how to ensure stronger security that prevents breaches before they start.

    Lets build a more secure future together
    When it comes to enterprise security, one size doesn’t fit all. It’s not just a question of what products or solutions are available; it’s which best fit your business needs, how well they can be integrated, and how effectively you adapt to future developments for a more secure enterprise. We want to know what can we do for you …We’re here to listen
  • Seamless Way to Add Fine-Grained Access Controls and Privileged Access Management to AD
    Active Directory Bridging: Add Access Controls to AD
    Active Directory (AD) is often a primary identity source and is, therefore, used for authentication of users. However, for effective security, you also need granular access management, both to control privileged users who require root and other functional accounts to administer servers, and to control end users accessing multiple applications. By adding access management to active directory by using FoxT BoKS ServerControl, you will be able to enforce authorization and authentication of everyone seeking access to your IT assets while simplifying the authentication of the user. BoKS provides a seamless way to add fine-grained access controls and privileged access management to your Active Directory processes. The AD Bridge capabilities make it very easy to synchronize user account information between AD and the BoKS infrastructure, leveraging AD as the authoritative source of information. Access control administration, enforcement, and audit is handled by FoxT BoKS ServerControl.
    avtive directory
    How We Help You Gain Control
    Automatically provision and de-provision user accounts and access rights across diverse servers, including propagated blocking of AD users to BoKS
    Controls use of privileged accounts without sharing passwords
    Enables AD users to seamlessly log into BoKS controlled hosts
    Leverages standard technologies such as Kerberos including support for Kerberos authentication in BoKS SSH (ssh, sftp, scp, su, suexec)
    Supports Kerberos ticket delegation and allows SSO in multiple steps between Kerberized servers
    No changes required in AD schema; uses standard Microsoft AD component “Identity Management for Unix”
    Supports multiple AD domains (forests) and multi-domain trust
    Automatically captures and consolidates access activity and keystroke logs across servers
    What This Means to You
    Quickly Meet Compliance:

    Quickly meet access/authorization regulations as described in SOX, HIPAA, GLBA, PCI DSS, FDCC and FISMA.

    Reduce Admin Overhead:

    The centralization of policy and audit data greatly reduces the administration and overhead normally associated with these tasks.

    Prevent Breaches:

    Define the who can do what, from where, when, and how to ensure stronger security that prevents breaches before they start.

    Lets build a more secure future together
    When it comes to enterprise security, one size doesn’t fit all. It’s not just a question of what products or solutions are available; it’s which best fit your business needs, how well they can be integrated, and how effectively you adapt to future developments for a more secure enterprise. We want to know what can we do for you …We’re here to listen.