A Secure Approach to Server Privilege Management for Windows, Unix and Linux
Lack of control over root or admin passwords, super-user status, or elevated privileges could lead to a damaging breach or audit violation. Although least-privilege enforcement on tier-1 Windows, Unix and Linux servers is critical, IT leaders are usually unable to control what users can do after authenticating into a server. Traditional solutions are not integrated, requiring a password storage tool to manage access and a separate sudo or least-privilege delegation tool for policy enforcement. This approach is inefficient, complex and expensive – plus it lacks behavioral analysis to identify security anomalies.
Biometric authentication is a type of system that relies on the unique biological characteristics of a person in order to verify identity for secure access to electronic systems. Biometric verification is a subset of biometric authentication.
The biometric technologies involved are based on the how individuals can be uniquely identified through one or more distinguishing biological traits, such as fingerprints, hand/earlobe geometry, earlobe, retina and iris patterns, voice waves, keystroke dynamics, DNA and signatures.
Biometric technologies are used to secure a wide range of electronic communications, including enterprise security, online commerce and banking, PC/mobile access, etc.