This year, the Linux kernel turns 31 years old(!), and a lot has changed since its inception in the early 90’s. Linux these days is ubiquitous, being the backbone of the Cloud, many IOT devices, and of course, a large part of the hybrid server estate and with great power, comes the great responsibility to ensure the most security without slowing operators down.
Attackers crave elevated access and enforcing least privilege is a foundational security control to prevent privileged attackers from gaining foothold across any point of entry. CyberArk extends an additional layer of security to enforce least privilege and centralize privilege escalation management in Linux environments with the recent release of Endpoint Privilege Manager (EPM) for Linux.
In this webinar, hear from Brandon Traffanstedt, Sr. Director, Field Technology Office, CyberArk and Cameron Skidmore, Global Partner Solutions Architect, Red Hat as they showcase how:
-CyberArk and Red Hat have partnered together to level up security across enterprise IT environments
-Common security controls can be applied to Linux systems consistently
-CyberArk EPM for Linux extends centralized least privilege to Red Hat Enterprise Linux (RHEL)
-EPM for Linux maximizes risk reduction benefits with minimal resources, allowing organizations to securely scale RHEL deployments to the Cloud and Edge
-See demonstrations in action: certificate signing just-in-time, centralized SUDOers management, and our favorite, mitigation of malicious behavior like elevated shell escapes
Recommended for You
Insights on new security requirements in Cloud environments that must be prioritized to protect an organization’s most valuable assets.
Join techUK, CyberArk & BT telecoms experts to understand the evolving cybersecurity landscape for telecom providers and navigating the UK TSA regulation.
Experts diagnosing your identity security challenges and prescribing a solution
In part 4 of our continuing webinar series supporting the upcoming O’Reilly book “Identity Security for Software Development”, we’ll examine a real-world case study of how a software development team
Gain valuable insights for your organization as Brian Miller, CISO at Healthfirst and Amy Blackshaw, VP of Product Marketing at CyberArk highlight the fundamentals of Identity Security.
In this webinar, the authors of the upcoming O’Reilly book, "Identity Security for Software Development," will explore essential identity security concepts in a practical and actionable manner, making
In this session you'll learn why you need to secure both your human and machine identities, as well as the applications and workloads they access along with approaches leading organizations are taking
CyberArk is publishing a new O’Reilly Book about secure software development best practices that will enable developers to build safer apps faster. This webinar is your chance to hear from the authors
Join us to explore securing privileges, credentials, and browsers for identity protection.
CyberArk experts discuss why you need a battle-tested PAM solution.
Expert insights and strategies to help you implement security controls that cover all types of identities.
CyberArk experts discuss strengthening your security perimeter to shut down identity-based attacks
Join ESG, Red Hat, and CyberArk to learn best practices and insights to fortify your Linux infrastructure.
In this webinar, ideal for IT security pros and leaders, learn how to take your Identity Management practices from foundational to exceptional.
CyberArk's Khizar Sultan and Andy Thompson deconstruct the Okta breach and share strategies you can take to mitigate the risks of identity attacks.
CyberArk’s CIO and SVP of Identity Security offer perspective on trends and how transformational organizations keep a step ahead of attackers.
Learn key considerations for success in implementing passwordless authentication for enterprises.
CyberArk's resident experts, Khizar Sultan and Andy Thompson, examine the root causes and lessons learned from the MGM Resorts attack.
Learn better ways to secure and simplify HR business processes that surround employee lifecycle management.
2023 Attack & Defend Virtual Series Session Two