Fortra™’s Core Privileged Access Manager (BoKS)

Additional Info

Company size (employees)1,000 to 4,999
Headquarters RegionNorth America
Type of solutionSoftware


Fortra™’s Core Privileged Access Manager (BoKS) transforms an organization’s multi-vendor Linux and UNIX server environment into one centrally managed security domain. BoKS simplifies the ability to enforce security policies and controls access to critical systems and information. With full control over accounts, access, and privilege, IT and security teams can stop internal and external attacks on critical systems before they start.

As a comprehensive privileged account management solution, Core Privileged Access Manager provides IT with one centralized location for managing the access and privileges of user profiles and accounts. Users are only given the access they need with least privilege access enforcement to keep security in the forefront.

Core Privileged Access Manager also enables IT teams to record keystrokes and output to gain full visibility across the environment and reduce the risk of insider threats. With the ability to create turnkey IT security and compliance reports, organizations can make well informed decisions based on the data gathered from their server environment.

How we are different

- Improving Security with Granular Privileged Access Controls: Most systems provide unrestricted, untraceable access, making privileged account management very difficult. Core Privileged Access Manager (BoKS) offers centralized privileged account delegation, enforcing which commands can be executed by role and eliminating privileged password sharing to significantly reduce the risk of insider threats.

- Enforcing Security Controls Across the Multi-Platform Environment: Many organizations run heterogenous Linux/UNIX server environments with a mix of legacy systems alongside new infrastructure, including on-premises servers, private cloud, and/or public cloud deployments. Core Privileged Access Manager provides centralized control over all accounts and privileged access, ensuring the principle of least privilege is applied across the entire environment.

- Ensuring Regulatory Compliance: Core Privileged Access Manager enables companies to meet compliance regulations, such as PCI-DSS, HIPAA, and SOZ. With automated credentials management and an enforcement approach, organizations get out of SSH key management, enabling them to increase the granularity of access enforcement, and meet strict compliance regulations. Core Privileged Access Manager is used by multi-national enterprises with the most stringent of compliance requirements to both ensure and simplify compliance.