Tag Archives: Linux Security

Fox Technologies Appoints New VP Of Sales To Accelerate Company Growth

 
Fox Technologies announces high-tech industry sales veteran, Bryan Short, as new VP of Sales.

GRAND RAPIDS, MIJanuary 13th, 2016Fox Technologies Inc., a portfolio company of Parallax Capital Partners and leader in Linux system access management solutions, announces the appointment of Bryan Short as vice president of sales. Short is a high-tech industry veteran with over 25 years of experience in sales, marketing, and business operations leadership. He will be responsible for strengthening Fox Technologies’ existing customer relationships, driving national sales strategies to generate demand and achieve revenue targets, and expanding reach into global markets.
Continue reading

Understanding the Real Risk of a Data Breach

system security, access management, identity access management, foxtTo better estimate how a breach can affect the bottom line, Verizon looked at actual data from 200 cyber insurance claims. You can view that infographic here.

Download Infographic

You may also be interested in: Best Practices for Unix/Linux Privileged Identity and Access Management

system security, identity access management, foxt, active directoryFoxT Access Management & Governance solutions complement your existing technologies by adding granular control and enforcement of authentication and authorization policies for both privileged and end users. www.foxt.com/boks

Mitigate IoT Security Risks By Controlling the AoIT (Access of Internet Things)

system security, access management, identity access management, foxtRegardless of the entry method — IoT machines, unpatched medical devices, BYOD’s, printers, etc. — when hackers steal private personal info from companies and governments, it requires that they obtain and exploit the credentials of privileged users. With the neverending growth in the IoT, how can enterprises protect themselves from the inevitable hacking attempts on their networks?

Centralized, granular controls over privileged access to all sensitive IT assets, with defined SSH access routes included in the authentication process would mitigate many of the risks associated with the growing number of IoT devices throughout our homes, communities, and workplaces. For example, a properly configured software solution like BoKS ServerControl could actually eliminate all elevated access rights from any number or whole sets of machines, or types of machines by model or make, machines with certain IOS versions, etc.
Continue reading

Linux.com Article: Managing IT Access Privileges — Not As Solved As Management Thinks

Secure, private, effective use of computers by a company (including hosted, cloud and other services as well as the company’s own systems) relies on managing access privileges.

The problem isn’t unique to computers. Office buildings, hotels, apartments and college dorms, for example, typically have “master keys” (or smart ID badges) that can open many-to-all of the locks in the facility, for security and other staff, while regular staff’s keys or badges only work on specified rooms and entryways.
Continue reading