2017 Cyberthreat Defense Report
Download CyberEdge’s fourth-annual Cyberthreat Defense Report – a comprehensive review of the perceptions of 1,100 IT security professionals representing 15 countries and 19 industries.
Banking Data Security and Access Control
Top 5 world bank uses BoKS ServerControl to secure over 13 million individual's and business customer's data.
The Essentials for Privileged Access Management
Learn how you can effectively and efficiently control privileged UNIX and Linux accounts using centralized access management.
Sudo or SuDon’t
Are you REALLY managing privileged command execution?
Centralized Access Management
Utility company simplifies compliance with centralized access management solution.
Why Sudo is No Longer Enough
The new privileged access management solutions available on the market today provide highly efficient and effective alternatives to sudo. Using these modern approaches, you will be able to reduce the risk of insider fraud, streamline regulatory compliance, and greatly reduce the effort required to administer your server estates.
Puppet: The Good, Bad and Ugly for Configuration Management & Security
Puppet is great for spinning up new VMs, blades and containers with static configurations that have short lifespans. However, if the server/VM is going to be around for any length of time using Puppet for Linux (and UNIX) OS security control does not scale very well...
Streamlined Privileged Access Management
Manufacturing company streamlines administration with centralized privileged user management across Unix/Linux Servers
SSH for Security and Compliance
SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control?
SWIFT and PCI-DSS
New Approaches Needed for Assurance in a World of Non-Stop and New Requirements
Streamlined Security for Healthcare
INTEGRIS Health Turns to Fox Technologies to Streamline Linux Server Management and Mitigate System Vulnerabilities
GEEK GUIDE: SSH - A Modern Lock for Your Server?
In modern computer systems, privacy and security are mandatory. In this Geek Guide edition you will get an in-depth look at the top 8 tips for hardening your SSH controls.
Why Many Companies Aren’t Securing OS Permissions Adequately
When it comes to ensuring that the operating systems in your IT infrastructure are adequately secured, access-permission-wise, some companies and organizations are more up to date — secure, and compliant — than others...
Scalable Privileged Access Management
Top 5 US Bank uses BoKS ServerControl to centrally control privileged access to more than 80,000 servers across multiple domains and global locations.
Best Practices for Linux Privileged Access Management
In the wrong hands, privileged accounts represent the biggest threat to enterprises because these accounts can breach personal data, complete unauthorized transactions, cause denial-of-service attacks, and hide activity by deleting audit data. Are you implementing these 9 best practices in your Linux environment?
Managing IT Access Privileges — Not As Solved As Management Thinks
The problem isn’t unique to computers. Office buildings, hotels, apartments and college dorms, for example, typically have “master keys” (or smart ID badges) that can open many-to-all of the locks in the facility, for security and other staff, while regular staff’s keys or badges only work on specified rooms and entryways.
BoKS ServerControl Administration Documentation
Learn how BoKS ServerControl can turn your hybrid Linux environment into one centrally managed domain.
2017 Cyber Threat Defense Report
Learn how your IT team can defend against cyber threats. This report is a comprehensive review of the perceptions of 1,100 IT security professionals representing 15 countries and 19 industries.
Solving Healthcare Security Concerns Will Require a Three-Pronged Effort
There’s a lot of contention on what to do within the healthcare industry as there does not seem to be a consensus on the best practices to apply to remain secure. Here are 3 things to always consider...
BoKS ServerControl Technical Specifications
Learn more about the technical specs for BoKS ServerControl
Increase Security, and Triple Efficiency
Top 5 US Bank uses BoKS ServerControl to meet strict audit requirements, and triple operational efficiencies.
As Public Cloud OS Instances Grow, So Do Security Admin Challenges
As companies move or extend IT from private to public clouds, and from virtual machines (VMs) to system images, they often use a number of different operating system versions. They run different Linux distributions, different distro releases, and perhaps also non-*nix OSes, along with multiple templates, and the total number of instances can grow.
Centralized ID Administration and Logging
Large financial processing company centralizes ID administration and logging across hybrid linux server environment, after merger.
The Growing Waves in the Linux Ecosystem, and its Squeaky Wheels
A lot has changed even in the last year, we’re experiencing a massive wave of Linux take-on via virtualization and the cloud as accelerators. New companies are growing from 10 servers to 10 thousand instances in two or three years...
Automated Security and Compliance Reporting
After failing a SOX audit, this leading food and beverage organization implemented an automated approach to privileged control.