Open Enterprise News

Open the new about your Business

Enter text paragraph here

Member Login

Lost your password?
Enter 468x60 Ad Code Here

New Utility Enforces Policies Across Linux, Unix and Windows Networks

Enter 468x60 Ad Code Here

Symark’s new PowerAdvantage utility allows system administrators to centralize their authentication, authorization and access management across Windows, Unix and Linux networks. It provides cross-platform unified log-in — users can have a single log-in and password for all Unix, Linux and Windows machines. This eliminates the need to establish separate access credentials for each system.

Symark International on Tuesday released PowerADvantage, an integrated authentication and configuration tool that extends features of Microsoft (Nasdaq: MSFT) Windows’ Active Directory to networks also running Unix and Linux systems.

PowerAdvantage adds centralized authentication, authorization and account access functionality to Unix and Linux systems. It’s also designed to bolster policy enforcement and infrastructure management functionality in the two non-Windows operating systems.

Among the chief benefits of PowerADvantage are the reduction in administration costs and security’s improvement, according to Symark. The new software also helps system administrators meet regulatory compliance efforts by centrally managing user identifications, authentication, security policies and automatic deployment of configuration settings across heterogeneous Unix and Linux environments.

“Why introduce this product now? The enterprise world is now ready to trim costs and make their networks more secure. Compliance laws now make it imperative to deal with situations such as five different user names for each worker needing access to Windows, Unix and Linux systems on the network,” Ellen Libenson, vice president of product marketing of Symark International, told LinuxInsider.

How It Works

PowerADvantage places an agent on Unix and Linux machines that communicates with Active Directory’s domain controllers. During the installation of the PowerADvantage agent, the Unix or Linux host is joined to the domain.

Then the host is configured to route authentication requests through the PowerADvantage agent. This allows the PowerADvantage agent to communicate with the Active Directory domain controllers to process authentication requests and access the Group Policy Objects used for configuration management.

After installation, the computer object for each Unix and Linux host can be moved to different organizational units in the Active Directory hierarchy, changing which set of Group Policy Objects apply to that host. The PowerADvantage Context of each host can also be changed, which will immediately change the log-in configuration for all Active Directory-based users logging in to that host.

Both of these changes can be performed without rebooting the host or restarting the PowerADvantage agent. Additionally, the PowerADvantage agent is configured by Group Policy. Thus, any changes in the configuration of the agents can be performed through Group Policy without the need to visit each individual host.

“The context feature in PowerADvantage can map to each user environment that has different user names for each system,” Jeff Nielsen, senior product manager of Symark International, told LinuxInsider.

Key Features

PowerADvantage provides cross-platform unified log-in — users can have a single log-in and password for all Unix, Linux and Windows machines. This eliminates the need to establish separate access credentials for each system and in turn increases efficiency and boosts productivity for end users while reducing calls to the help desk related to misplaced passwords, Symark said.

Easy installation allows system administrators to deploy the product quickly without making any irreversible changes to the Active Directory schema. The agent installation process eliminates complex, time-consuming configuration changes. Additionally, PowerADvantage’s intelligent import wizard streamlines and simplifies the importing and mapping of current Unix and Linux user information directly into Active Directory.

PowerADvantage provides corporate officials with detailed compliance reports. These help ensure that all activities performed on Unix and Linux systems are written to the proper Active Directory logs. It produces audit reports required by Sarbanes-Oxley, the Payment Card Industry Data Security Standard, and the Health Insurance Portability and Accountability Act, providing a comprehensive trail for auditors. This simplifies the compliance process and reduces overall audit costs, said Symark, and it allows for the more rapid discovery of anomalies as part of a sound security posture.

“An essential advantage is the ability to disable access of former employees from one spot to each account. Administrators don’t have to worry about orphaned access,” Nielson explained.

Reduced Overhead

Comprehensive centralized storage keeps all user and group information within Active Directory. This reduces infrastructure costs by eliminating redundant identity stores, including legacy directories, unsecured network information system servers and locally managed files. Storing information within Active Directory, along with integrated use of existing Windows administration tools, enables IT managers to utilize applications with familiar interfaces.

This eliminates the need to license third-party synchronization products or to build and maintain in-house solutions. Operations, training and processes for provisioning, account maintenance and other administrative tasks are streamlined by standardizing on a single set of Active Directory-based tools.

Standalone or Integrated

“PowerADvantage is a standalone product, but it can be added onto PowerBroker,” said Nielson.

PowerBroker provides Unix and Linux workstations and networks with increased security and accountability by delegating administrative privileges and granting selective access to corporate resources without disclosing the root password. This reduces the risk of accidental damage and the threat of malicious activities.

This integration with Symark’s PowerBroker enhances security and compliance efforts by facilitating efficient management of both end-user and administrator account access from Active Directory while controlling access and tasks performed using the root account, he said.

Using either custom-created administrative templates or those provided by PowerADvantage, administrators create configuration settings that are automatically stored in Active Directory. This facilitates the rapid automatic deployment and maintenance of configuration settings across a large number of hosts, reducing administrative time and cost.

These policies are reapplied to each host based on a predetermined interval. The feature insures that any unapproved changes to the configuration items maintained by PowerADvantage will be reset back to the approved settings at the next policy refresh interval.

PowerADvantage is available for both server and work station pricing, according to Libenson.

For server installations the product costs US$290 per server. For workstation installations the product costs $45 per station.


Related posts

Comments are closed.

Recent Posts

Tocomail Debuts An Email Service Designed For Kids

Tocomail, a new iPhone and iPad application launching today, aims to be first email service for kids. The app was designed ...

American Consumers in 2013 Most Upbeat Since Before Recession

American consumers in 2013 were more upbeat than at any time in the previous six years as views on the ...

10 New Year’s Resolutions for Young Workers

The first of January is quickly approaching, and many individuals have already drawn up their list of New Year's resolutions. ...

Moguls Rent South Dakota Addresses to Dodge Taxes Forever

Among the nation’s billionaires, one of the most sought-after pieces of real estate right now is a quiet storefront in ...

The Reverse Guest Blogging Trend in 2014 May Be Huge: How it Works

As Google moves toward a semantic approach, focusing more on the big picture of a search as opposed to keywords, ...

Business Networks 2014: Disrupt And Conquer

Companies plugged into the Networked Economy en masse in 2013. And in 2014, they’ll supercharge their efforts. Leveraging business networks, they’ll harness ...

10 Strategies for Surviving a Cash Flow Slump

Maybe you haven’t had the earnings you projected you would this year. Maybe some key invoices are still unpaid and ...

5 Tips for Changing Careers on a Budget

Sometimes it takes a long time to figure out what you want to be when you grow up, and that’s ...
We will keep You Updated...
Sign up to receive breaking news
as well as receive other site updates!
Featured Video
Enter 300x250 Ad Code Here
Popular Posts

What You Should Know About the EB-5 Investor Visa Process

This article will address important aspects of the EB-5 Investor Visa Program that you sho

The Vibrance of Boston

Boston, Massachusetts is one of the oldest cities in the United States, and is considered

How the iPad has Made Remote Desktop Software Even Better

Remote Desktop Software, also known as Remote Control Software or Remote Access Software,

Can Oracle be trusted with Java

With Sun gone, will Oracle wreck Java, or set it free? For years Sun dominated the Java wo

Advanced Messaging & Routing with AMQP

Not all message queues are made equal. In the simplest case, a message queue is synonymous

A Bankrupt BP – Worse For The Financial World Than Lehman Brothers?

The BP crisis in the Gulf of Mexico has rightfully been analysed (mostly) from the ecolog

Video Games Increasingly Bringing Players Together Through the Internet

Video games themselves are not something that is completely new. Many of us remember playi

Commodity Update

As of this post September Crude is lower by 1.4% but prices did hold above the 9 day MA. $

British Telecom Files Legal Suit Against Google

British Telecom has filed a lawsuit against Google at a United States court over its Andro

Sycamore Partners Will Buy Talbots for 369 million

Talbots Inc., a retailer and direct marketer of women’s classic clothing, shoes and acce

New York area hospitals and physicians using Remote Access Software to help manage their patients

Area hospitals in New York are using Remote Access Software to manage their patient flow.

Immigrants See Open Doors to America through EB-5 Investor Visa Program

Increasing numbers of foreigners are entering the United States by obtaining the EB-5 gree

Remote Access and Security: an Issue to Reckon With

How many times have you been to a client's office to make a presentation and forgot to inc

What is the difference between SEO and SEM

Search Engine Optimization (SEO) and Search Engine Marketing (SEM) represent two of the mo

Don't Abridge Your Patients' Stories

The medical community is currently facing many simultaneous changes to the way it has func