+1-202-802-9399 U.S. Headquarters
Free Trial

Introducing Thycotic
Privilege Manager for Unix

Enhance your Secret Server security by enforcing
least privilege on Unix/Linux root admin accounts!

  • Enables Secret Server administrators to build a Unix command whitelist to limit what users can do with privileged accounts.

  • Increases security with granular control of root credentials to limit privileges, while meeting compliance regulations and policies for Unix Superuser Privilege Management (SUPM).

  • Report on what commands users can run to prove audit or compliance mandates.

Try Privilege Manager for Unix free for 30 days by starting a Secret Server trial

By completing this form you are opting into emails from Thycotic. You can unsubscribe at any time.

Learn How to Implement Least Privilege Access for UNIX Admin Users

Utilizing SSH command whitelisting,
Privilege Manager for Unix
gives you greater control

SSH Command whitelisting allows admins to log in as root, but only gives them access to a set of predefined commands. For example they might be able to restart the database and read log files, but not reset user passwords.

Thycotic Privilege Manager for Unix provides an integrated Secret Server security solution that enables you to control and monitor the commands super users can run based on their role and required tasks.

  • Minimizes the use of privileged rights and enforces least privilege policies for superuser rights.
  • Replaces siloed sudo configuration files with an enterprise-ready, scalable security solution with audit capabilities.
  • Restricts commands based on defined policies and limited superuser permissions, reducing the risk of misuse, abuse or accidental error.
  • Provides complete management, monitoring, recording and secure single-sign-on for Secret Server privileged accounts.
  • Easily delegate and revoke privileged UNIX administration without having to manage sudo files or allow full root access.

Key benefits for
Secret Server customers

Group of Users – Enforce least privilege for Unix superusers

Ensure privileged accounts are more secure by enforcing least privilege policies for Unix superusers without impacting their productivity.

Umbrella – Minimize the risk of data breaches

Minimize the risk of data breaches and insider abuse associated with unauthorized access to, or escalated privileges of, Unix superuser accounts

Checklist – Demonstrate compliance with security policies

Demonstrate compliance with security policies and regulations by showing auditors that superuser privileges are effectively managed, monitored, controlled, and secure.

Admins – Enable Unix admins to centrally manage Unix accounts linked to AD

Enable Unix administrators to centrally manage and provision Unix accounts that are linked to AD.

Piggy Bank – Save money by reducing help desk calls and account management issues

Save time and money by significantly reducing help desk calls and minimizing Unix admin account management issues.

Chart – Provide auditors with proof of user authorizations

Understand and prove to auditors what users are authorized to do with root credentials.

See for yourself!
try thycotic Privilege Manager for Unix
free for 30 days

Choose your deployment option:
Cloud
On-Premise
By completing this form you are opting into emails from Thycotic. You can unsubscribe at any time.