dcsimg

Sudo Revealed: The Good, Bad and Ugly of Open Source Privileged Identity Management

Many organizations have attempted to use open source sudo as their privileged identity management solution. While sudo might be a viable solution for small scale organizations, CSOs managing large IT environments are consistently discovering that sudo creates security, compliance and productivity challenges to large enterprises seeking to protect critical assets.

Many organizations have attempted to use open source sudo as their privileged identity management solution. While sudo might be a viable solution for small scale organizations, CSOs managing large IT environments are consistently discovering that sudo creates security, compliance and productivity challenges to large enterprises seeking to protect critical assets.

In this webinar, we will discuss how an open source solution like sudo can work in smaller scale enterprises, but can cause security hindrances and risks for larger scale companies, including the vulnerability of sudo-protected data by hackers. By stepping back and looking at the good, the bad and the ugly of the sudo solution, enterprises will learn that sudo represents an illusion of control over access to a company’s critical assets and understand the true cost of “free.”

Moderator:
Joe Brockmeier

Senior Editor, Linux Magazine

Speakers:
Mark Diodati

Senior Identity & Security Analyst, Burton Group

“Bob Hacker”
Notorious Unix hacker

Saurabh Bhatnagar
VP of Product Management, BeyondTrust

Comments are closed.