Virtualization Technology News and Information
Article
RSS
BeyondTrust Introduces New PowerBroker Identity Services to Provide Secure Cloud Authentication Solution

BeyondTrust, the leading provider of privilege delegation and authorization management solutions, today announced the expansion of the BeyondTrust portfolio to include authentication for cross-platform and cloud-based environments. Following its recent asset purchase from Likewise Software, BeyondTrust is launching the PowerBroker Identity Services platform. Two new PowerBroker Identity Services products will be released to seamlessly integrate Linux, Mac OS X, and Unix systems with Microsoft Active Directory: PowerBroker Identity Services, Enterprise Edition and PowerBroker Identity Services, Open Edition. BeyondTrust will provide seamless ongoing support for all Likewise Enterprise and LikeWise Open customers, and will continue to develop the both products under the PowerBroker Identity Services platform.   

The acquisition of Likewise Software’s Likewise Enterprise and Likewise Open products expands the BeyondTrust portfolio of ‘inside perimeter’ privilege delegation, monitoring and auditing solutions to include authentication and auditing management for cloud environments.

“As more organizations move corporate computing to the cloud, IT administrators are encountering increasingly complex authentication and security issues, particularly surrounding the management of user identity,” said Earl Perkins, research vice president in the Security and Privacy team at Gartner. “The security risks associated with running a multi-platform network compel organizations to implement identity and access management initiatives that will seamlessly integrate platforms with identity repositories and securely authenticate users with their existing domain credentials.”

PowerBroker Identity Services, Enterprise Edition addresses the authentication, audit and reporting needs of companies running multiple operating systems in their network while simultaneously easing the task of IT managers required to authenticate users, control access to applications and data, centrally manage settings within group policies, and create reports for regulatory audits. The solution also enforces company policies to help comply with regulatory requirements like Sarbanes-Oxley and HIPAA, and speeds up auditing by providing robust reporting tools with a number of pre-made reports.

Key features of PowerBroker Identity Services Enterprise Edition:

  • Joins non-Windows servers to Microsoft Active Directory in less than five minutes.
  • Provides centralized user management for Linux, Unix, and Mac OS X.
  • Provide a single username and password for all Windows and non-Windows systems.
  • Does not require extending Active Directory schema to add non-Windows systems to your network.
  • Provides support for multiple Active Directory forests and one-way and two-way cross-forest trusts.

Likewise, PowerBroker Identity Services, Open Edition is the open source foundation for PowerBroker Identity Services that joins Linux, UNIX, and Mac OS systems to Microsoft Active Directory to securely authenticate non-Windows users with AD credentials.

“BeyondTrust brings a rich heritage of support for the Open Source community, having developed and supported PowerBroker Servers Linux edition for many years. PowerBroker Identity Services Open Edition will accelerate our involvement with the Open Source community,” said Jim Zierick, executive vice president, products at BeyondTrust.”

“This portfolio expansion – particularly when combined with our recent asset purchase from Lumigent– reflects our response to what we see as a growing ecosystem emerging around internal security threats and identity management in the enterprise,” said John Mutch, CEO of BeyondTrust. “As more organizations worldwide rank insider fraud and data breaches as one of their top IT security priorities, we are aggressively striving to build and provide the industry’s most comprehensive portfolio of authentication solutions addressing data privacy, the monitoring of insider threats, and assuring regulatory compliance for multi-platform environments We are securing the “perimeter within.”

Published Thursday, June 30, 2011 7:39 PM by David Marshall
Filed under: ,
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
top25
Calendar
<June 2011>
SuMoTuWeThFrSa
2930311234
567891011
12131415161718
19202122232425
262728293012
3456789