BoKS ServerControl 7.0
Access Management Software
for UNIX and Linux Servers
BoKS ServerControl: the world’s first software to
provide granular access control for UNIX and Linux.
BoKS ServerControl is a comprehensive access management solution for
enterprises whose networks include multi-vendor UNIX or Linux platforms. It meets
the administrative and security requirements of financial institutions, government
agencies, and any organization that operates in a dynamic, diverse, and
security-sensitive environment.
Here’s what we do better than anyone...
•	 Specify required authentication per user, host, or access method.
•	 Issue and manage internal and external certificate authority.
•	 Enforce password policy for all servers from a central point.
•	 Monitor and report access with centralized audit logs.
•	 Check file and system integrity.
•	 Apply system-wide security policies from a central point.
•	 Delegate sub-administration for tiered support structure.
•	 Distribute user accounts to hosts across platforms.
•	 Define allowed access methods and restrictions per user and user class.
•	 Control SSH with sub protocol to separate access methods
(SSH Shell, SCP, SFTP, SSH exec, etc) for granular control of access.
•	 Grant privileges to execute programs as other users, including root.
•	 Enable keystroke logging of individual commands and entire login sessions.
•	 Set and enforce inactivity policy per user and global inactivity policies.
616.438.0840
sales@foxt.com
www.foxt.com
Out-of-the-box
Installation integrates
seamlessly with
existing infrastructure
•	 Modular command line interface
•	 Active directory bridge
•	 Web services interface API
•	 User-friendly graphic interface
Built by UNIX people, for UNIX people.
Fox Technologies, Inc. helps
companies protect corporate
information assets with network
security and access management
software for UNIX and Linux.
We strive to simplify compliance
and streamline administration
with an award-winning access
management and privileged
account control solution.
Our access management software
centrally enforces granular access
entitlements in real time across
diverse server environments.
To contact Fox Technologies, you
can email us at sales@foxt.com or
visit our website at www.foxt.com.
Triple Your Efficiency
With BoKS ServerControl, administra-
tors can manage identities, access,
privilege, and policy for the entire enter-
prise from a single source. It eliminates
the need to distribute configuration files
to each individual server. A robust set
of tools effectively manage large-scale
environments. Sub-administration tasks
allow an organization to enable a tiered
support structure. The web services
API integrates well with your corporate
identity source, making it possible to
automatically provision and deprovision
access downstream when new users
are added to your environment.
Control Who, What,
When, Where & How
A BoKS managed environment pro-
vides granular controls over user ses-
sions which allow for direct connection
to endpoint systems instead of forcing
connection through a proxy-like device.
Other products in this space offer
centralized user management and au-
thentication, but lack granular controls
over the users session. BoKS enables
fine-grained control of each connection
with the ability to control characteristics
like the source, destination, access
method, authentication type, and more.
BoKS further enables individual control
of SSH sub-components such as shell,
sftp, scp, port-forwarding, etc.
Replay Security Events
BoKS ServerControl provides central-
ized real time logging of all access at-
tempts within your BoKS domain. Audit
logs are displayed in standard syslog
format and feed into your SIEM solution
for event management and privileged
access monitoring. Log information
includes source, destination, method,
tty session (if applicable), date, time,
specific command info, and more.
©2015 Fox Technologies, Inc.
BoKS ServerControl 7.0
Robust Tools for UNIX and Linux
That Save Time and Money
Built by UNIX people, for UNIX people.
616.438.0840
sales@foxt.com
www.foxt.com

More Related Content

PPTX
WSO2 Identity Server - Getting Started
PDF
Mexon LOGINventory5
PPTX
Wso2 is integration with .net core
PPTX
K8s rbac-sso
PDF
Design Pattern Logical Model
ODP
Anypoint platform security components
PPTX
Microservices-101
DOC
Balancing performance, accuracy, and precision for secure cloud transactions
WSO2 Identity Server - Getting Started
Mexon LOGINventory5
Wso2 is integration with .net core
K8s rbac-sso
Design Pattern Logical Model
Anypoint platform security components
Microservices-101
Balancing performance, accuracy, and precision for secure cloud transactions

What's hot (18)

PDF
Self-contained Systems: A Different Approach to Microservices
PPT
Citrix Enterprise Access Infrastructure
PDF
Sample Template for Single Sign-On (SSO)
PDF
Authentication in microservice systems - fsto 2017
PDF
Microservices: Architecture to scale Agile
PPTX
Identity Access and Management with Globus
PPTX
Deeper into DSC (DSC vs. GPO vs. DCM - What and When)
ODP
Anypoint platform security components
PPTX
Adaptive provisioning of human expertise in Service Oriented Systems ppt
PDF
White Paper : Powerful Health Care Information system
PDF
Deep Dive into dockerized Microservices
PDF
ICTA Technology Meetup 03 - SOA Security
PDF
Visio Diagram of a user SSO Flow
PDF
SEI_8 VF Data Interoperability Platform Services
PPTX
Securing mule
PPTX
Web o sppt
PPTX
Dell Password Manager Introduction
PPTX
The process of authentication
Self-contained Systems: A Different Approach to Microservices
Citrix Enterprise Access Infrastructure
Sample Template for Single Sign-On (SSO)
Authentication in microservice systems - fsto 2017
Microservices: Architecture to scale Agile
Identity Access and Management with Globus
Deeper into DSC (DSC vs. GPO vs. DCM - What and When)
Anypoint platform security components
Adaptive provisioning of human expertise in Service Oriented Systems ppt
White Paper : Powerful Health Care Information system
Deep Dive into dockerized Microservices
ICTA Technology Meetup 03 - SOA Security
Visio Diagram of a user SSO Flow
SEI_8 VF Data Interoperability Platform Services
Securing mule
Web o sppt
Dell Password Manager Introduction
The process of authentication
Ad

Viewers also liked (17)

PDF
PDF
IRS + Estúdio Berinjela
DOCX
HONR 4000 Report - Alyssa Hofstetter
PDF
Sudo is no longer enough
PDF
The Essentials | Privileged Access Management
PPTX
Tercer paso
PPTX
Economia
PPTX
Datos1
PPTX
Apresentação1
PDF
Diseño grafico
DOCX
Educación de adultos
DOC
17 dichos para vivir bien
DOCX
Rubrica identidad etnica
DOCX
3º C Parque Eólico
DOC
Arte flamenco
PDF
DOCX
IRS + Estúdio Berinjela
HONR 4000 Report - Alyssa Hofstetter
Sudo is no longer enough
The Essentials | Privileged Access Management
Tercer paso
Economia
Datos1
Apresentação1
Diseño grafico
Educación de adultos
17 dichos para vivir bien
Rubrica identidad etnica
3º C Parque Eólico
Arte flamenco
Ad

Similar to BoKS ServerControl version 7.0 (8)

PDF
FoxT BoKS ServerControl Full Specifications Document
PDF
Utility Protects Servers and Simplies Compliance with Access Management
PDF
BoKS ServerControl Health System Use Case: Integris Healthcare
PDF
Integris Health Care: BoKS ServerControl Use Case for Healthcare Systems
PDF
Secpanel | Simple to use security tool for linux servers
PDF
Introduction to SELinux Part-I
PDF
PPT_Compiled
PPT
AIXpert - AIX Security expert
FoxT BoKS ServerControl Full Specifications Document
Utility Protects Servers and Simplies Compliance with Access Management
BoKS ServerControl Health System Use Case: Integris Healthcare
Integris Health Care: BoKS ServerControl Use Case for Healthcare Systems
Secpanel | Simple to use security tool for linux servers
Introduction to SELinux Part-I
PPT_Compiled
AIXpert - AIX Security expert

Recently uploaded (20)

PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PDF
MCP Security Tutorial - Beginner to Advanced
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
PDF
Types of Token_ From Utility to Security.pdf
PDF
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PPTX
Cybersecurity: Protecting the Digital World
PDF
Designing Intelligence for the Shop Floor.pdf
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Microsoft Office 365 Crack Download Free
PPTX
Tech Workshop Escape Room Tech Workshop
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PDF
AI Guide for Business Growth - Arna Softech
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PPTX
Introduction to Windows Operating System
PPTX
Computer Software - Technology and Livelihood Education
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
Oracle Fusion HCM Cloud Demo for Beginners
MCP Security Tutorial - Beginner to Advanced
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
Types of Token_ From Utility to Security.pdf
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Cybersecurity: Protecting the Digital World
Designing Intelligence for the Shop Floor.pdf
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
Computer Software and OS of computer science of grade 11.pptx
Microsoft Office 365 Crack Download Free
Tech Workshop Escape Room Tech Workshop
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
AI Guide for Business Growth - Arna Softech
CCleaner 6.39.11548 Crack 2025 License Key
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
Introduction to Windows Operating System
Computer Software - Technology and Livelihood Education

BoKS ServerControl version 7.0

  • 1. BoKS ServerControl 7.0 Access Management Software for UNIX and Linux Servers BoKS ServerControl: the world’s first software to provide granular access control for UNIX and Linux. BoKS ServerControl is a comprehensive access management solution for enterprises whose networks include multi-vendor UNIX or Linux platforms. It meets the administrative and security requirements of financial institutions, government agencies, and any organization that operates in a dynamic, diverse, and security-sensitive environment. Here’s what we do better than anyone... • Specify required authentication per user, host, or access method. • Issue and manage internal and external certificate authority. • Enforce password policy for all servers from a central point. • Monitor and report access with centralized audit logs. • Check file and system integrity. • Apply system-wide security policies from a central point. • Delegate sub-administration for tiered support structure. • Distribute user accounts to hosts across platforms. • Define allowed access methods and restrictions per user and user class. • Control SSH with sub protocol to separate access methods (SSH Shell, SCP, SFTP, SSH exec, etc) for granular control of access. • Grant privileges to execute programs as other users, including root. • Enable keystroke logging of individual commands and entire login sessions. • Set and enforce inactivity policy per user and global inactivity policies. 616.438.0840 sales@foxt.com www.foxt.com Out-of-the-box Installation integrates seamlessly with existing infrastructure • Modular command line interface • Active directory bridge • Web services interface API • User-friendly graphic interface Built by UNIX people, for UNIX people.
  • 2. Fox Technologies, Inc. helps companies protect corporate information assets with network security and access management software for UNIX and Linux. We strive to simplify compliance and streamline administration with an award-winning access management and privileged account control solution. Our access management software centrally enforces granular access entitlements in real time across diverse server environments. To contact Fox Technologies, you can email us at sales@foxt.com or visit our website at www.foxt.com. Triple Your Efficiency With BoKS ServerControl, administra- tors can manage identities, access, privilege, and policy for the entire enter- prise from a single source. It eliminates the need to distribute configuration files to each individual server. A robust set of tools effectively manage large-scale environments. Sub-administration tasks allow an organization to enable a tiered support structure. The web services API integrates well with your corporate identity source, making it possible to automatically provision and deprovision access downstream when new users are added to your environment. Control Who, What, When, Where & How A BoKS managed environment pro- vides granular controls over user ses- sions which allow for direct connection to endpoint systems instead of forcing connection through a proxy-like device. Other products in this space offer centralized user management and au- thentication, but lack granular controls over the users session. BoKS enables fine-grained control of each connection with the ability to control characteristics like the source, destination, access method, authentication type, and more. BoKS further enables individual control of SSH sub-components such as shell, sftp, scp, port-forwarding, etc. Replay Security Events BoKS ServerControl provides central- ized real time logging of all access at- tempts within your BoKS domain. Audit logs are displayed in standard syslog format and feed into your SIEM solution for event management and privileged access monitoring. Log information includes source, destination, method, tty session (if applicable), date, time, specific command info, and more. ©2015 Fox Technologies, Inc. BoKS ServerControl 7.0 Robust Tools for UNIX and Linux That Save Time and Money Built by UNIX people, for UNIX people. 616.438.0840 sales@foxt.com www.foxt.com