New Readers

 Home News and World Report Buyers Guide Global Excellence Technology Case Studies Editorial Awards About Info Security
2008 Best Deployment Scenario

 Access Controls for Virtualized Environments

WHAT IS THIS TECHNOLOGY? Virtualization in the data center can be a way to reduce costs, optimize processing and storage resources, and better manage disaster recovery provisions. However, because it is so easy to create virtual machines, controlling them and ensuring they comply with enterprise access control policies is a real challenge. Organizations battling “VM sprawl” are concerned about the lack of structured controls over the user accounts that are harbored on these virtual machines. Without centralized access control, the benefits of virtualization are easily reverted. 

Info Security Products Guide
this article
COMPARE and print reports
RATE products

WHAT DOES THIS TECHNOLOGY DO? Recognizing the challenges of virtualization, FoxT has just extended the access control management and auditing benefits provided by the BoKS Access Control for Servers solution to work on virtual platforms.

With FoxT’s BoKS Access Control for Servers, you can define and apply common access control, authentication, and password policies across your Unix and Linux domain, treating virtual machines in exactly the same way as physical machines. Virtual servers become full members of the protected domain, with all common Unix/Linux services such as login, telnet, and SSH controlled from a central point. In addition, all user access activities are centrally logged so you have a complete picture of who is doing what on your virtual machines. 

For ease of administration, you can define logical groups of servers, which can include a mixture of virtual and physical machines. You are then able to provision and control user access to these groups. Add a user to a group, and the user will automatically be provisioned to all the machines in that group whether physical or virtual. This enables you to dynamically manage user permissions in fast-changing environments.

BoKS Access Control for Servers can be configured to automatically control virtual servers as soon as they come on-line. Pre-register a server definition, and the new virtual machine contacts the BoKS Master server as soon as it is brought on-line. Even if a virtual server is only used sporadically for specific tasks, you can ensure that it is always subject to your enterprise access controls and policies.

BoKS Access Control for Servers supports virtual environments running VMWare ESX Server, IBM Virtual I/O Server, and zLinux running on IBM z-Series mainframes. The standard BoKS features like file monitoring, keystroke logging, alerting and vulnerability checking are all available for virtual machines.

Conclusion: Centralized access control management over virtual and non-virtual servers enables organizations to reduce administration efforts, streamline IT audits with centralized logging of user activities, and reduce the risk of fraud.  Conclusion: organizations can maintain control over their user populations while taking advantage of the many business benefits of server virtualization.

Fox Technologies (FoxT) 
883 N. Shoreline Blvd. D-210
Mountain View, CA  94043

Tel: +1-425-706-0044
CLICK HERE to download whitepaper