Sudo Revealed: The Good, Bad and Ugly of Open Source Privileged Identity Management
Many organizations have attempted to use open source sudo as their privileged identity management solution. While sudo might be a viable solution for small scale organizations, CSOs managing large IT environments are consistently discovering that sudo creates security, compliance and productivity challenges to large enterprises seeking to protect critical assets.
By
Thursday, May 13th, 2010
Many organizations have attempted to use open source sudo as their privileged identity management solution. While sudo might be a viable solution for small scale organizations, CSOs managing large IT environments are consistently discovering that sudo creates security, compliance and productivity challenges to large enterprises seeking to protect critical assets.
In this webinar, we will discuss how an open source solution like sudo can work in smaller scale enterprises, but can cause security hindrances and risks for larger scale companies, including the vulnerability of sudo-protected data by hackers. By stepping back and looking at the good, the bad and the ugly of the sudo solution, enterprises will learn that sudo represents an illusion of control over access to a company’s critical assets and understand the true cost of “free.”
Moderator:
Joe Brockmeier
Senior Editor, Linux Magazine
Speakers:
Mark Diodati
Senior Identity & Security Analyst, Burton Group
“Bob Hacker”
Notorious Unix hacker
Saurabh Bhatnagar
VP of Product Management, BeyondTrust