Tag Archives: BoKS Server Control

Fox Technologies Launches Release 7.1 of its Privileged Access Management Solution, Designed to Meet the Operational Challenges for Accelerated Deployments of Enterprise Linux

GRAND RAPIDS, MI – Tuesday, May 3, 2017 – Fox Technologies, Inc, a leader in Linux security solutions, today announced the release of BoKS ServerControl 7.1, a privileged access management solution for organizations strategically deploying Enterprise Linux driven by accelerating business investments in Cloud, Big Data and Digital Transformation.
Continue reading

SWIFT and PCI-DSS: New Approaches Needed for Assurance in a World of Non-stop and New Requirements

system security, access management, identity access management, foxtAt the official start of summertime 2016 in Britain we are starting to consume the labor of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine and my neighbors’ gardens. I’m very VERY careful sterilizing glassware, containers, and buckets: there was this unfortunate incident three years ago (no, you don’t want to hear the horrible details), enough to say I watch each step like a hawk to ensure a batch does not become tainted.

Why am I bothering you with my alcoholic side-line?

Continue reading

Infographic: The Growing Linux Wave

system security, access management, identity access management, foxtThe Growing Linux Wave: POINTS TO DEMAND FOR IDENTITY AND ACCESS MANAGEMENT SOLITIONS

According to a Linux Foundation’s end-user trends report, Linux leads the way in enterprise deployments. Fox Technologies conducted a survey to find out how enterprises currently manage their Linux servers and their plans in the next year. The results point to an increasing demand for identity and access management (IAM) solutions.
Continue reading

SSH Management With BoKS ServerControl Software

ssh management, server control, boksSSH Management has been in the press a lot the last 2 years.

Sponsored reports from analysts have focused on poor key and SSH management practices, a highly speculative assertion that Edward Snowden somehow used keys to gain access to systems (which he denies), and now the US NIST has published a document that, among other things, puts a focus on ‘automated authentication’ used for application-to-application (app2app) or system-to-system/computer-to-computer (c2c) communications.

NIST now recommends that the same level of focus and account management that has been recommended for year for interactive (people) accounts be placed on these automated accounts. Continue reading

Fox Technologies Appoints New VP Of Sales To Accelerate Company Growth

 
Fox Technologies announces high-tech industry sales veteran, Bryan Short, as new VP of Sales.

GRAND RAPIDS, MIJanuary 13th, 2016Fox Technologies Inc., a portfolio company of Parallax Capital Partners and leader in Linux system access management solutions, announces the appointment of Bryan Short as vice president of sales. Short is a high-tech industry veteran with over 25 years of experience in sales, marketing, and business operations leadership. He will be responsible for strengthening Fox Technologies’ existing customer relationships, driving national sales strategies to generate demand and achieve revenue targets, and expanding reach into global markets.
Continue reading

The Biggest Security Threats We’ll Face in 2016

system security, access management, identity access management, foxt2015 has been the year where social engineering became the common trend among many high-profile breaches – resulting in hundreds of millions of compromised records. Going into 2016, Wired Magazine is predicting the top 5 security threats to be: extortion hacks, attacks that change or manipulate data, chip-and-pin innovations, the rise of the IoT zombie botnet, and more backdoors.

What do you think the biggest security threats of 2016 will be?
Continue reading

Security’s Biggest Winners and Losers of 2015

system security, access management, identity access management, foxtTHIS YEAR, LAWMAKERS surprised us by taking initial steps—albeit, baby ones—to rein in some of the NSA’s mass spying and provide better oversight of the intelligence agency’s activities. It’s unclear, however, if these gains and other privacy victories will hold or will be undone in the panic after the Paris attacks.

Following the terrorist assault in November, which killed more than 100 people, US government officials seized the opportunity to revive their campaign against encryption and password-protected devices, calling on companies like Apple and Google to install “voluntary backdoors” in their phones so law enforcement can access protected content with, or perhaps even without, a warrant. Lawmakers have also introduced legislation that would reinstate the NSA’s program for bulk-collecting US phone records, a program that lawmakers ended earlier this year.
Continue reading

Mysterious Data Breach Exposes 191 Million Voter Records

system security, access management, identity access management, foxtWhen it comes to voting, there are basically two arguments: a civic one, which states that voting is the moral duty of every able citizen in a democracy, and an economic one, which states that voting is a fruitless endeavor in a game with terrible odds. Perhaps the economists had the right of it. A massive database with 191 million voter records has made its way online, and the strangest part is, no one can quite figure out who put it there or when it will be taken down.
Continue reading

How Administrative Safeguards Can Prevent Data Breaches

system security, access management, identity access management, foxtPreventing healthcare data breaches is a common goal for covered entities of all sizes. It can be easy to let the importance of administrative safeguards fall behind other areas, such as concerns over hacking and stolen devices, but organizations need to keep this aspect a key part of their larger data security plan.

According to the Department of Health and Human Services, administrative safeguards are “administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.”
Continue reading

The most innovative and damaging hacks of 2015

system security, access management, identity access management, foxtThe year’s most significant attacks highlight how hackers are changing tactics — and how security must evolve in the year ahead.

Not a week went by in 2015 without a major data breach, significant attack campaign, or serious vulnerability report. Many of the incidents were the result of disabled security controls, implementation errors, or other basic security mistakes, highlighting how far organizations have to go in nailing down IT security basics.
Continue reading