CA Technologies has released Virtual Privilege Manager, a software tool designed to secure user privileged access to a virtual environment and monitor user activity.
One of the key features is a privilege password management option, which allows users to check out one-time passwords to access the virtual environment. These passwords can then be manually or automatically checked in.
All passwords are secured in a password vault and the actions of privileged users are audited. Virtual Privilege Manager is also capable of supporting servers, applications, databases and devices across a variety of virtual environments, the firm said.
Organisations need comprehensive capabilities to expand their virtual environments and overcome management challenges, according to Birendra Gosai, principal product marketing manager at CA Technologies.
"The use of virtual environments allows organisations to utilise resources to help business continuity and cut costs," he told V3.co.uk. "Virtual Privilege Manager bolsters security, while helping to maintain the segregation of duty roles."
The product allows comprehensive hardening of the hypervisor service console by clearly limiting the rights of privileged users and eliminating the shared accounts on the hypervisor service console, CA said.
Gosai gave the example of users not being able to copy, edit or delete data controlled by virtual environment administrators.
Key system resources, programs, files and processes are also protected by time, login method, network attributes and access criterion, Gosai added.
User activity monitoring and comprehensive reporting options mean that all activity performed on the hypervisor service console is audited. Use of privileged accounts based on the original user can be tracked to see who has access to what in the virtual environment, the firm said.
Virtual Privilege Manager costs $699 (£459) per CPU when bought independently. CA counts a CPU with up to 12 cores as one processor.
The software is an addition to the CA Virtual portfolio, which comprises Virtual Assurance, Virtual Automation and Virtual Configuration.
IBM and Technical University of Munich team demonstrate how Shor's algorithm, which can't be cracked by conventional computers, can be solved quickly with quantum computing
Hubble Space Telescope finds superflares from young red dwarfs could strip away planetary atmosphere
Younger stars are 100 to 1,000 times more energetic than when they're older
Two of the big four supermarkets will use the system to control sales of restricted products
PUBG news and updates: November's Update #23 to bring new Skorpion pistol and changes to blue zone visibility
Genuinely useful side-arm coming to PUBG in Update #23