H2FY20 IT services firm enhances UNIX security while simplifying management "Today if we need to add a new administrator, we can do it on multiple servers simultaneously. And if someone leaves, we only need to disable the active directory account and access to all UNIX and Linux servers associated with that account is revoked instantly." also enables them to utilize their AD password policy and Kerberos authentication, thus further enhancing their security. “With a single identity, our administrators can easily remember their password, even if it is complex and is required to be updated more frequently. No longer do they have to take the extra time to look in some encrypted password store to log in to a server,” said Jezek. Additionally, they are able to log all activity in one place, which makes reporting and compliance much simpler. “The ability to log access in one place is quite advantageous for us,” Jezek said, “Now we have a single identity, and we can be absolutely sure that it is the same account across the servers. In addition if we have some kind Jan Jezek, Owner and director of Business Communication One Identity, and the One Identity logo are trademarks of One Identity LLC. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. One Identity disclaims any proprietary interest in the marks and names of others. Availability and terms of One Identity, Solutions and Services vary by region. This case study is for informational purposes only. One Identity makes no warranties – express or implied—in this case study. © 2017 One Identity LLC, ALL RIGHTS RESERVED. CaseStudy-Bcom-US-KJ-28410 of issue or need to add a new administrator, we can do it on multiple servers simultaneously,” Jezek said. “And if someone leaves, we only need to disable the active directory account and then access to all UNIX and Linux servers associated with that account is revoked instantly.” About One Identity One Identity helps organizations optimize identity and access management (IAM). Our combination of offerings, including a portfolio of identity governance, access management, privileged management and identity as a service solutions, enables organizations to achieve their full potential – unimpeded by security, yet safeguarded against threats. For more information, visit www.oneidentity.com Please complete the form to gain access to this content Access Now Related Resources Q4FY20 Fighting Pass-the-Hash With or Without Red Forest. Maintaining Business Momentum in the Face of Forced Change Optimizing SIEM Upgrade to State-of-the-Art Log Management Centralised control simplifies management, boosts security Key Findings: Privileged Access and the Impact of Pass the Hash Attacks Controlling and managing super user access H2FY20 You can get IAM right: Access Management H2FY20 Authentication Services Single Sign-on for SAP® H2FY20 The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution H2FY20 Securely Managing Your UNIX Environment H2FY20 Managing SAP user accounts and access rights using Identity Manager H2FY20 Get IAM Right in SAP – centric organizations H2FY20 Banks Invests in Faster, more Secure IAM Processes H2FY20 The Journey to IAM Success: See how six organizations get IAM right H2FY20 Six steps to achieving data access governance H2FY20 8 Best Practices for Identity and Access Management H2FY20 Journey to IAM Success: Exclusive insights and recommendations H2FY20 Strategies to ensure the success for your identity governance project H2FY20 Get IAM Right: Identity Governance eBook
"Today if we need to add a new administrator, we can do it on multiple servers simultaneously. And if someone leaves, we only need to disable the active directory account and access to all UNIX and Linux servers associated with that account is revoked instantly." also enables them to utilize their AD password policy and Kerberos authentication, thus further enhancing their security. “With a single identity, our administrators can easily remember their password, even if it is complex and is required to be updated more frequently. No longer do they have to take the extra time to look in some encrypted password store to log in to a server,” said Jezek. Additionally, they are able to log all activity in one place, which makes reporting and compliance much simpler. “The ability to log access in one place is quite advantageous for us,” Jezek said, “Now we have a single identity, and we can be absolutely sure that it is the same account across the servers. In addition if we have some kind Jan Jezek, Owner and director of Business Communication One Identity, and the One Identity logo are trademarks of One Identity LLC. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. One Identity disclaims any proprietary interest in the marks and names of others. Availability and terms of One Identity, Solutions and Services vary by region. This case study is for informational purposes only. One Identity makes no warranties – express or implied—in this case study. © 2017 One Identity LLC, ALL RIGHTS RESERVED. CaseStudy-Bcom-US-KJ-28410 of issue or need to add a new administrator, we can do it on multiple servers simultaneously,” Jezek said. “And if someone leaves, we only need to disable the active directory account and then access to all UNIX and Linux servers associated with that account is revoked instantly.” About One Identity One Identity helps organizations optimize identity and access management (IAM). Our combination of offerings, including a portfolio of identity governance, access management, privileged management and identity as a service solutions, enables organizations to achieve their full potential – unimpeded by security, yet safeguarded against threats. For more information, visit www.oneidentity.com