SlideShare a Scribd company logo
1 of 2
Download to read offline
BoKS ServerControl 7.0
Access Management Software
for UNIX and Linux Servers
BoKS ServerControl: the world’s first software to
provide granular access control for UNIX and Linux.
BoKS ServerControl is a comprehensive access management solution for
enterprises whose networks include multi-vendor UNIX or Linux platforms. It meets
the administrative and security requirements of financial institutions, government
agencies, and any organization that operates in a dynamic, diverse, and
security-sensitive environment.
Here’s what we do better than anyone...
•	 Specify required authentication per user, host, or access method.
•	 Issue and manage internal and external certificate authority.
•	 Enforce password policy for all servers from a central point.
•	 Monitor and report access with centralized audit logs.
•	 Check file and system integrity.
•	 Apply system-wide security policies from a central point.
•	 Delegate sub-administration for tiered support structure.
•	 Distribute user accounts to hosts across platforms.
•	 Define allowed access methods and restrictions per user and user class.
•	 Control SSH with sub protocol to separate access methods
(SSH Shell, SCP, SFTP, SSH exec, etc) for granular control of access.
•	 Grant privileges to execute programs as other users, including root.
•	 Enable keystroke logging of individual commands and entire login sessions.
•	 Set and enforce inactivity policy per user and global inactivity policies.
616.438.0840
sales@foxt.com
www.foxt.com
Out-of-the-box
Installation integrates
seamlessly with
existing infrastructure
•	 Modular command line interface
•	 Active directory bridge
•	 Web services interface API
•	 User-friendly graphic interface
Built by UNIX people, for UNIX people.
Fox Technologies, Inc. helps
companies protect corporate
information assets with network
security and access management
software for UNIX and Linux.
We strive to simplify compliance
and streamline administration
with an award-winning access
management and privileged
account control solution.
Our access management software
centrally enforces granular access
entitlements in real time across
diverse server environments.
To contact Fox Technologies, you
can email us at sales@foxt.com or
visit our website at www.foxt.com.
Triple Your Efficiency
With BoKS ServerControl, administra-
tors can manage identities, access,
privilege, and policy for the entire enter-
prise from a single source. It eliminates
the need to distribute configuration files
to each individual server. A robust set
of tools effectively manage large-scale
environments. Sub-administration tasks
allow an organization to enable a tiered
support structure. The web services
API integrates well with your corporate
identity source, making it possible to
automatically provision and deprovision
access downstream when new users
are added to your environment.
Control Who, What,
When, Where & How
A BoKS managed environment pro-
vides granular controls over user ses-
sions which allow for direct connection
to endpoint systems instead of forcing
connection through a proxy-like device.
Other products in this space offer
centralized user management and au-
thentication, but lack granular controls
over the users session. BoKS enables
fine-grained control of each connection
with the ability to control characteristics
like the source, destination, access
method, authentication type, and more.
BoKS further enables individual control
of SSH sub-components such as shell,
sftp, scp, port-forwarding, etc.
Replay Security Events
BoKS ServerControl provides central-
ized real time logging of all access at-
tempts within your BoKS domain. Audit
logs are displayed in standard syslog
format and feed into your SIEM solution
for event management and privileged
access monitoring. Log information
includes source, destination, method,
tty session (if applicable), date, time,
specific command info, and more.
©2015 Fox Technologies, Inc.
BoKS ServerControl 7.0
Robust Tools for UNIX and Linux
That Save Time and Money
Built by UNIX people, for UNIX people.
616.438.0840
sales@foxt.com
www.foxt.com

More Related Content

What's hot

Self-contained Systems: A Different Approach to Microservices
Self-contained Systems: A Different Approach to MicroservicesSelf-contained Systems: A Different Approach to Microservices
Self-contained Systems: A Different Approach to MicroservicesEberhard Wolff
 
Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureEmirates Computers
 
Sample Template for Single Sign-On (SSO)
Sample Template for Single Sign-On (SSO)Sample Template for Single Sign-On (SSO)
Sample Template for Single Sign-On (SSO)Mike Reams
 
Authentication in microservice systems - fsto 2017
Authentication in microservice systems - fsto 2017Authentication in microservice systems - fsto 2017
Authentication in microservice systems - fsto 2017Dejan Glozic
 
Microservices: Architecture to scale Agile
Microservices: Architecture to scale AgileMicroservices: Architecture to scale Agile
Microservices: Architecture to scale AgileEberhard Wolff
 
Identity Access and Management with Globus
Identity Access and Management with GlobusIdentity Access and Management with Globus
Identity Access and Management with GlobusGlobus
 
Deeper into DSC (DSC vs. GPO vs. DCM - What and When)
Deeper into DSC (DSC vs. GPO vs. DCM - What and When)Deeper into DSC (DSC vs. GPO vs. DCM - What and When)
Deeper into DSC (DSC vs. GPO vs. DCM - What and When)Matthew Hitchcock
 
Anypoint platform security components
Anypoint platform security componentsAnypoint platform security components
Anypoint platform security componentsD.Rajesh Kumar
 
Adaptive provisioning of human expertise in Service Oriented Systems ppt
Adaptive provisioning of human expertise in Service Oriented Systems pptAdaptive provisioning of human expertise in Service Oriented Systems ppt
Adaptive provisioning of human expertise in Service Oriented Systems pptSurya2306
 
White Paper : Powerful Health Care Information system
White Paper : Powerful Health Care Information systemWhite Paper : Powerful Health Care Information system
White Paper : Powerful Health Care Information systemKuntal(KJ) Mehta
 
Deep Dive into dockerized Microservices
Deep Dive into dockerized MicroservicesDeep Dive into dockerized Microservices
Deep Dive into dockerized Microservicesinovex GmbH
 
ICTA Technology Meetup 03 - SOA Security
ICTA Technology Meetup 03 - SOA SecurityICTA Technology Meetup 03 - SOA Security
ICTA Technology Meetup 03 - SOA SecurityCrishantha Nanayakkara
 
Visio Diagram of a user SSO Flow
Visio Diagram of a user SSO FlowVisio Diagram of a user SSO Flow
Visio Diagram of a user SSO FlowMike Reams
 
SEI_8 VF Data Interoperability Platform Services
SEI_8 VF Data Interoperability Platform ServicesSEI_8 VF Data Interoperability Platform Services
SEI_8 VF Data Interoperability Platform ServicesFITMAN FI
 
Securing mule
Securing   muleSecuring   mule
Securing muleSindhu VL
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager IntroductionAidy Tificate
 

What's hot (18)

Self-contained Systems: A Different Approach to Microservices
Self-contained Systems: A Different Approach to MicroservicesSelf-contained Systems: A Different Approach to Microservices
Self-contained Systems: A Different Approach to Microservices
 
Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access Infrastructure
 
Sample Template for Single Sign-On (SSO)
Sample Template for Single Sign-On (SSO)Sample Template for Single Sign-On (SSO)
Sample Template for Single Sign-On (SSO)
 
Authentication in microservice systems - fsto 2017
Authentication in microservice systems - fsto 2017Authentication in microservice systems - fsto 2017
Authentication in microservice systems - fsto 2017
 
Microservices: Architecture to scale Agile
Microservices: Architecture to scale AgileMicroservices: Architecture to scale Agile
Microservices: Architecture to scale Agile
 
Identity Access and Management with Globus
Identity Access and Management with GlobusIdentity Access and Management with Globus
Identity Access and Management with Globus
 
Deeper into DSC (DSC vs. GPO vs. DCM - What and When)
Deeper into DSC (DSC vs. GPO vs. DCM - What and When)Deeper into DSC (DSC vs. GPO vs. DCM - What and When)
Deeper into DSC (DSC vs. GPO vs. DCM - What and When)
 
Anypoint platform security components
Anypoint platform security componentsAnypoint platform security components
Anypoint platform security components
 
Adaptive provisioning of human expertise in Service Oriented Systems ppt
Adaptive provisioning of human expertise in Service Oriented Systems pptAdaptive provisioning of human expertise in Service Oriented Systems ppt
Adaptive provisioning of human expertise in Service Oriented Systems ppt
 
White Paper : Powerful Health Care Information system
White Paper : Powerful Health Care Information systemWhite Paper : Powerful Health Care Information system
White Paper : Powerful Health Care Information system
 
Deep Dive into dockerized Microservices
Deep Dive into dockerized MicroservicesDeep Dive into dockerized Microservices
Deep Dive into dockerized Microservices
 
ICTA Technology Meetup 03 - SOA Security
ICTA Technology Meetup 03 - SOA SecurityICTA Technology Meetup 03 - SOA Security
ICTA Technology Meetup 03 - SOA Security
 
Visio Diagram of a user SSO Flow
Visio Diagram of a user SSO FlowVisio Diagram of a user SSO Flow
Visio Diagram of a user SSO Flow
 
SEI_8 VF Data Interoperability Platform Services
SEI_8 VF Data Interoperability Platform ServicesSEI_8 VF Data Interoperability Platform Services
SEI_8 VF Data Interoperability Platform Services
 
Securing mule
Securing   muleSecuring   mule
Securing mule
 
Web o sppt
Web o spptWeb o sppt
Web o sppt
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
The process of authentication
The process of authenticationThe process of authentication
The process of authentication
 

Viewers also liked

Viewers also liked (17)

LORTCTC
LORTCTCLORTCTC
LORTCTC
 
IRS + Estúdio Berinjela
IRS + Estúdio BerinjelaIRS + Estúdio Berinjela
IRS + Estúdio Berinjela
 
HONR 4000 Report - Alyssa Hofstetter
HONR 4000 Report - Alyssa HofstetterHONR 4000 Report - Alyssa Hofstetter
HONR 4000 Report - Alyssa Hofstetter
 
Sudo is no longer enough
Sudo is no longer enoughSudo is no longer enough
Sudo is no longer enough
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
Tercer paso
Tercer pasoTercer paso
Tercer paso
 
Economia
EconomiaEconomia
Economia
 
Datos1
Datos1Datos1
Datos1
 
Apresentação1
Apresentação1Apresentação1
Apresentação1
 
Diseño grafico
Diseño graficoDiseño grafico
Diseño grafico
 
Educación de adultos
Educación de adultosEducación de adultos
Educación de adultos
 
17 dichos para vivir bien
17 dichos para vivir bien17 dichos para vivir bien
17 dichos para vivir bien
 
Rubrica identidad etnica
Rubrica identidad etnicaRubrica identidad etnica
Rubrica identidad etnica
 
3º C Parque Eólico
3º C Parque Eólico3º C Parque Eólico
3º C Parque Eólico
 
Arte flamenco
Arte flamencoArte flamenco
Arte flamenco
 
SSCA
SSCASSCA
SSCA
 
Deu 7
Deu 7Deu 7
Deu 7
 

Similar to BoKS ServerControl version 7.0

FoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications DocumentFoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications DocumentRyan Gallavin
 
Blancco Management Console
Blancco Management ConsoleBlancco Management Console
Blancco Management ConsoleJemma Elliott
 
Proxmox ve-datasheet
Proxmox ve-datasheetProxmox ve-datasheet
Proxmox ve-datasheetMiguel Angel
 
Access management
Access managementAccess management
Access managementkmehul
 
Proxy Networks - Proxy Pro 8.10 Remote Desktop Software
Proxy Networks - Proxy Pro 8.10 Remote Desktop SoftwareProxy Networks - Proxy Pro 8.10 Remote Desktop Software
Proxy Networks - Proxy Pro 8.10 Remote Desktop SoftwareProxy Networks, Inc.
 
EXTERNAL- Better Self Enablement Overview
EXTERNAL- Better Self Enablement OverviewEXTERNAL- Better Self Enablement Overview
EXTERNAL- Better Self Enablement OverviewDhaneesh ..
 
PROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENTPROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENThardik soni
 
Enterprise Content Management
Enterprise Content ManagementEnterprise Content Management
Enterprise Content ManagementEnvigeek
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
 
CS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling TechnologiesCS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling Technologieskarthikajegadeesan
 
Integris Health Care: BoKS ServerControl Use Case for Healthcare Systems
Integris Health Care: BoKS ServerControl Use Case for Healthcare SystemsIntegris Health Care: BoKS ServerControl Use Case for Healthcare Systems
Integris Health Care: BoKS ServerControl Use Case for Healthcare SystemsRyan Gallavin
 
BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare Ryan Gallavin
 
Identity Management
Identity ManagementIdentity Management
Identity Managementrver21
 
Proxifier
ProxifierProxifier
Proxifierraza530
 

Similar to BoKS ServerControl version 7.0 (20)

FoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications DocumentFoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications Document
 
SOSCOE Overview
SOSCOE OverviewSOSCOE Overview
SOSCOE Overview
 
Kaseya monitoring tool
Kaseya monitoring toolKaseya monitoring tool
Kaseya monitoring tool
 
Blancco Management Console
Blancco Management ConsoleBlancco Management Console
Blancco Management Console
 
IPCOM000242565D
IPCOM000242565DIPCOM000242565D
IPCOM000242565D
 
Proxmox ve-datasheet
Proxmox ve-datasheetProxmox ve-datasheet
Proxmox ve-datasheet
 
Access management
Access managementAccess management
Access management
 
Proxy Networks - Proxy Pro 8.10 Remote Desktop Software
Proxy Networks - Proxy Pro 8.10 Remote Desktop SoftwareProxy Networks - Proxy Pro 8.10 Remote Desktop Software
Proxy Networks - Proxy Pro 8.10 Remote Desktop Software
 
EXTERNAL- Better Self Enablement Overview
EXTERNAL- Better Self Enablement OverviewEXTERNAL- Better Self Enablement Overview
EXTERNAL- Better Self Enablement Overview
 
PROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENTPROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENT
 
Enterprise Content Management
Enterprise Content ManagementEnterprise Content Management
Enterprise Content Management
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
CS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling TechnologiesCS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling Technologies
 
Integris Health Care: BoKS ServerControl Use Case for Healthcare Systems
Integris Health Care: BoKS ServerControl Use Case for Healthcare SystemsIntegris Health Care: BoKS ServerControl Use Case for Healthcare Systems
Integris Health Care: BoKS ServerControl Use Case for Healthcare Systems
 
BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
LiveDOCS
LiveDOCSLiveDOCS
LiveDOCS
 
Proxifier
ProxifierProxifier
Proxifier
 

Recently uploaded

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 

Recently uploaded (20)

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 

BoKS ServerControl version 7.0

  • 1. BoKS ServerControl 7.0 Access Management Software for UNIX and Linux Servers BoKS ServerControl: the world’s first software to provide granular access control for UNIX and Linux. BoKS ServerControl is a comprehensive access management solution for enterprises whose networks include multi-vendor UNIX or Linux platforms. It meets the administrative and security requirements of financial institutions, government agencies, and any organization that operates in a dynamic, diverse, and security-sensitive environment. Here’s what we do better than anyone... • Specify required authentication per user, host, or access method. • Issue and manage internal and external certificate authority. • Enforce password policy for all servers from a central point. • Monitor and report access with centralized audit logs. • Check file and system integrity. • Apply system-wide security policies from a central point. • Delegate sub-administration for tiered support structure. • Distribute user accounts to hosts across platforms. • Define allowed access methods and restrictions per user and user class. • Control SSH with sub protocol to separate access methods (SSH Shell, SCP, SFTP, SSH exec, etc) for granular control of access. • Grant privileges to execute programs as other users, including root. • Enable keystroke logging of individual commands and entire login sessions. • Set and enforce inactivity policy per user and global inactivity policies. 616.438.0840 sales@foxt.com www.foxt.com Out-of-the-box Installation integrates seamlessly with existing infrastructure • Modular command line interface • Active directory bridge • Web services interface API • User-friendly graphic interface Built by UNIX people, for UNIX people.
  • 2. Fox Technologies, Inc. helps companies protect corporate information assets with network security and access management software for UNIX and Linux. We strive to simplify compliance and streamline administration with an award-winning access management and privileged account control solution. Our access management software centrally enforces granular access entitlements in real time across diverse server environments. To contact Fox Technologies, you can email us at sales@foxt.com or visit our website at www.foxt.com. Triple Your Efficiency With BoKS ServerControl, administra- tors can manage identities, access, privilege, and policy for the entire enter- prise from a single source. It eliminates the need to distribute configuration files to each individual server. A robust set of tools effectively manage large-scale environments. Sub-administration tasks allow an organization to enable a tiered support structure. The web services API integrates well with your corporate identity source, making it possible to automatically provision and deprovision access downstream when new users are added to your environment. Control Who, What, When, Where & How A BoKS managed environment pro- vides granular controls over user ses- sions which allow for direct connection to endpoint systems instead of forcing connection through a proxy-like device. Other products in this space offer centralized user management and au- thentication, but lack granular controls over the users session. BoKS enables fine-grained control of each connection with the ability to control characteristics like the source, destination, access method, authentication type, and more. BoKS further enables individual control of SSH sub-components such as shell, sftp, scp, port-forwarding, etc. Replay Security Events BoKS ServerControl provides central- ized real time logging of all access at- tempts within your BoKS domain. Audit logs are displayed in standard syslog format and feed into your SIEM solution for event management and privileged access monitoring. Log information includes source, destination, method, tty session (if applicable), date, time, specific command info, and more. ©2015 Fox Technologies, Inc. BoKS ServerControl 7.0 Robust Tools for UNIX and Linux That Save Time and Money Built by UNIX people, for UNIX people. 616.438.0840 sales@foxt.com www.foxt.com