"One of the most common security challenges Linux and Unix IT
administrators face is how to effectively manage the root or
super-user account. In an age of regulatory compliance and data
privacy laws--and as more and more organizations elect to run
mission-critical financial, CRM (customer relationship management),
SCM (supply chain management) and other applications in
heterogeneous Unix and Linux environments--controlling and auditing
privileged account access is more crucial than ever.
"Without proper controls, anyone with access to the root
account--the virtual 'keys to the kingdom'--is given complete
super-user privileges without justification based on their job
classification, specific duties or role within the IT
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.