This year, the Linux kernel turns 31 years old(!), and a lot has changed since its inception in the early 90’s. Linux these days is ubiquitous, being the backbone of the Cloud, many IOT devices, and of course, a large part of the hybrid server estate and with great power, comes the great responsibility to ensure the most security without slowing operators down.
Attackers crave elevated access and enforcing least privilege is a foundational security control to prevent privileged attackers from gaining foothold across any point of entry. CyberArk extends an additional layer of security to enforce least privilege and centralize privilege escalation management in Linux environments with the recent release of Endpoint Privilege Manager (EPM) for Linux.
In this webinar, hear from Brandon Traffanstedt, Sr. Director, Field Technology Office, CyberArk and Cameron Skidmore, Global Partner Solutions Architect, Red Hat as they showcase how:
-CyberArk and Red Hat have partnered together to level up security across enterprise IT environments
-Common security controls can be applied to Linux systems consistently
-CyberArk EPM for Linux extends centralized least privilege to Red Hat Enterprise Linux (RHEL)
-EPM for Linux maximizes risk reduction benefits with minimal resources, allowing organizations to securely scale RHEL deployments to the Cloud and Edge
-See demonstrations in action: certificate signing just-in-time, centralized SUDOers management, and our favorite, mitigation of malicious behavior like elevated shell escapes
Recommended for You

Running Kubernetes on Amazon EKS? You’re likely already using cert-manager—the open source standard for TLS and mTLS certificate automation in Kubernetes clusters. Today, we’re excited to announce...

See how modern identity security protects your cloud without compromising speed or control

As organizations modernize IT infrastructure, many are adopting platforms like OpenShift Virtualization to run both traditional virtual machines (VMs) and containerized workloads on a single,...

CyberArk’s Udi Mokady and industry leaders discuss AI, cybersecurity trends and identity governance in a keynote packed with strategic insights.

Discovery how CyberArk and AWS secure identities and sensitive data for manufacturers

Learn how to secure Kubernetes environments and overcome key challenges with insights from CyberArk and Red Hat experts.

Red Hat and CyberArk's new Event-Driven Ansible plug-in automates responses to alerts, saving time and resolving issues faster.

The increasing complexity of generative AI-driven cyberthreats demands a more diligent approach to how organizations detect and respond to these dangers

Unified Defense-in-depth endpoint security with CyberArk Endpoint Privilege Manager and Palo Alto Networks Cortex

CyberArk and AWS explore the growing risks developers face

How to optimize cloud security for all identities – human and machine – across the enterprise with CyberArk on AWS.

This Gorilla Guide outlines how to protect developers across multiple cloud architectures without impeding their daily workflows.

AI is shaping the evolution of DevSecOps and application security.

How to get a complete view of your exposure, control of your credentials when scanning, and automate your processes to reduce complexity.

Recently, we researched a project on Portainer, the go-to open-source tool for managing Kubernetes and Docker environments. With more than 30K stars on GitHub, Portainer gives you a user-friendly...

The rise of the Internet of Things (IoT) and Operational Technology (OT) devices is reshaping industries, accelerating innovation and driving new efficiencies. However, as organizations...

Easily manage and secure everything your developers access and build in the cloud

Native access to AWS resources with zero standing privileges and just in time access

From the moment ChatGPT was released to the public, offensive actors started looking to use this new wealth of knowledge to further nefarious activities. Many of the controls we have become...

In this cloud, DevOps and AI era, security teams grapple with the growing challenge of shadow secrets and vault sprawl. As organizations scale, secrets management increasingly fragments. For...