Control and record "which privileged users have access to what." You can centrally define the commands that privileged users are able to execute on any UNIX or Linux platform.
Centrally manage security policies from a single point. The intuitive drag-and-drop interface makes it easy to create rules instead of relying on manual scripting.
Powerful risk-analysis tools record and play back user activity-down to the keystroke level. The unique risk-profiling capability points out any collected user input that poses a risk.
Prove compliance with permanent audit records 24 x 7 x 365, not just around compliance audits. Detailed logs of user activity help maintain your compliance posture.
Privileged account delegation
Securely delegate UNIX/Linux privileged account authority without affecting the ability of users to get their work done.
Single configurable port
All agent traffic is encrypted and directed through a single port for easy product configuration and deployment in multi-firewall environments.
Novell Privileged User Manager includes an embedded SQL database back-end where some or all databases can be AES encrypted.
Novell Privileged User Manager is managed via an intuitive web-based console which can be accessed throughout your intranet and extranet zones. The interface includes a Command Control console that lets you configure your privileged user management policies.
Reusable script and command libraries
Novell Privileged User Manager includes sample libraries of policy objects that can be simply dragged and dropped to build powerful, yet visually easy to understand, security rules.
Hierarchical rule structure
Rules can be visually constructed without scripting. Simply drag and drop to create rule hierarchies that determine the processing order.
Intuitive failover and load balancing
Host agents can be visually configured in hierarchical domain structures that automatically determine load-balancing and failover between components.
Color-coded risk ratings for commands
Event records can be color-coded with a risk rating according to the command run, the user who ran it, and the location.
Real-time keystroke logging
Keystroke logs are updated in real time throughout the duration of a user's session.
Play back recorded user-session keystrokes in an intuitive interface that lets you control playback speed and direction.
Automatic data filtering
Create pre-defined rules to pull events from your audit log files using comprehensive filters and schedules.
Users can be automatically emailed a daily summary of events awaiting approval.
Indelible audit record
All auditor activity is indelibly recorded on the event record, including the viewing of keystroke log activity, status changes and any notes recorded during the analysis.
For events that require further analysis, a workflow process sends events to the appropriate reviewers-either by sending an email notification or flagging the event in the Compliance Auditor console.
Add an additional layer of security to your FTP transactions by using this replacement daemon for fully audited and authenticated FTP transactions.
Drop in UNIX/Linux shell replacement
Privileged commands can be executed on-demand with a 'usrun' statement or the user shell replaced to provide command authentication and/or total session auditing ACL Restrictions.