This year, the Linux kernel turns 31 years old(!), and a lot has changed since its inception in the early 90’s. Linux these days is ubiquitous, being the backbone of the Cloud, many IOT devices, and of course, a large part of the hybrid server estate and with great power, comes the great responsibility to ensure the most security without slowing operators down.
Attackers crave elevated access and enforcing least privilege is a foundational security control to prevent privileged attackers from gaining foothold across any point of entry. CyberArk extends an additional layer of security to enforce least privilege and centralize privilege escalation management in Linux environments with the recent release of Endpoint Privilege Manager (EPM) for Linux.
In this webinar, hear from Brandon Traffanstedt, Sr. Director, Field Technology Office, CyberArk and Cameron Skidmore, Global Partner Solutions Architect, Red Hat as they showcase how:
-CyberArk and Red Hat have partnered together to level up security across enterprise IT environments
-Common security controls can be applied to Linux systems consistently
-CyberArk EPM for Linux extends centralized least privilege to Red Hat Enterprise Linux (RHEL)
-EPM for Linux maximizes risk reduction benefits with minimal resources, allowing organizations to securely scale RHEL deployments to the Cloud and Edge
-See demonstrations in action: certificate signing just-in-time, centralized SUDOers management, and our favorite, mitigation of malicious behavior like elevated shell escapes
Recommended for You

The CA/Browser Forum has approved sweeping changes to the TLS certificate lifecycle, reducing the maximum validity for public certificates to just 47 days, down from today’s 398.

Phishing and compromised credentials remain the leading causes of security breaches. Traditional passwords are not only vulnerable.

Passwords continue to create friction for users and risk for security teams, even as many organizations begin moving toward more modern access models.

In this session, attendees will review the progression of quantum computing along with industry recommendations to help agencies prepare for and transition to post quantum cryptography.

Traditional approaches to workforce identity security are no match for today's evolving threats. This session introduces a defense-in-depth strategy that reimagines how to secure workforce identities

Struggling with access reviews? Get expert tips on automation, catching hidden accounts, and staying audit-ready in this must-watch webinar.

Despite the shift toward passkeys and multi-factor authentication, many legacy and third-party apps still rely on passwords. To balance security and productivity, enterprises need effective password

Unlock hybrid cloud potential with secure, seamless dev access. Learn to cut excessive privileges, automate ops, and boost agility—without slowing innovation.

Endpoint Security in Higher Education Webinar

Take an in-depth look into the journey toward a passwordless future, examining both its benefits and the challenges organizations face during transition.

Practical strategies for aligning identity management practices with multiple frameworks and standards.

Join us to explore key strategies for securing your Linux and Windows servers. Protect your data and enhance your organization’s security!

As organizations embrace multi-cloud to boost innovation and agility, they face growing security and compliance risks.

Gain actionable insights into how modern identity security solutions provide more than just privileged access management

Learn about identity security trends from the CyberArk 2025 Identity Security Landscape Report and risk reduction guidance.

How organizations build comprehensive security programs to meet today’s threats.

Join our joint webinar with Amazon and CyberArk security experts to learn how to manage secrets at scale while balancing the needs of your security and development teams.

Cloud environments are prime targets for cyberattacks. Join us to learn how ZSP and TEA frameworks prevent breaches while keeping developers productive.

Drawing from real-world incident response engagements, our expert will help you to identify and prioritize proactive controls through lessons learned from the field.

This on-demand webinar features cybersecurity leaders from Accenture, AWS, and CyberArk discussing how financial institutions can enhance cloud security and streamline access management.