{"id":14307,"date":"2023-07-20T22:51:03","date_gmt":"2023-07-20T22:51:03","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=14307"},"modified":"2026-01-25T07:46:57","modified_gmt":"2026-01-25T07:46:57","slug":"webinar-ensure-air-tight-security-on-linux-endpoints","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux","title":{"rendered":"Webinar: Air-Tight Security on Linux"},"content":{"rendered":"\n<p>The ??? ?? ? ????????? ?????? ??????? is strengthening all weak points in your IT environment &#8211; and it&#8217;s not just Windows and macOS devices that need protecting.<\/p>\n\n\n\n<p>Linux endpoints often get neglected, leaving gaping holes in otherwise tight security. All it takes is one compromised device with local admin rights to bring down an entire network.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/company\/adminbyrequest\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Admin By Request<\/a>&nbsp;is a multi-platform PAM solution offering local admin rights management on Windows, macOS, and Linux.<\/p>\n\n\n\n<p>These are some of the epic features that come with our biggest Linux update yet:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Per-app elevation in sudo sessions<\/li>\n\n\n\n<li>Application pre-approval and blocklisting<\/li>\n\n\n\n<li>Logging of programs executed in sudo sessions<\/li>\n\n\n\n<li>Integration of identity management tools such as Active Directory, FreeIPA, and LDAP domain<\/li>\n<\/ul>\n\n\n\n<p>Click one of the links below to get all the feature demos and details and ensure air-tight security on Linux endpoints?\ufe0f Sessions available in English, Danish, and German.<\/p>\n\n\n\n<p>???????:<br><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/2516897413322\/WN_fx_-N7m3RWi-PlPQWreBhA\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/us06web.zoom.us\/webinar\/register\/2516897413322\/WN_fx_-N7m3RWi-PlPQWreBhA<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/2516897413322\/WN_fx_-N7m3RWi-PlPQWreBhA\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"\/wp-content\/uploads\/2023\/07\/Linux2-01-1024x535.png\" alt=\"Webinar: Air-Tight Security on Linux\" class=\"wp-image-14308\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux2-01-1024x535.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux2-01-300x157.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux2-01-768x401.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux2-01-1536x803.png 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux2-01-2048x1070.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>??????:<br><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/9716897413870\/WN_eoJsRP_JQe6LwYHlMDzP6g\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/us06web.zoom.us\/webinar\/register\/9716897413870\/WN_eoJsRP_JQe6LwYHlMDzP6g<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/9716897413870\/WN_eoJsRP_JQe6LwYHlMDzP6g\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"\/wp-content\/uploads\/2023\/07\/Linux-02-1-1024x535.png\" alt=\"Webinar: Air-Tight Security on Linux (Danish)\" class=\"wp-image-14309\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-02-1-1024x535.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-02-1-300x157.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-02-1-768x401.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-02-1-1536x803.png 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-02-1-2048x1070.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>??????:<br><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/8116897414475\/WN_FOqxblVYR_GN9tRoQHJu_w\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/us06web.zoom.us\/webinar\/register\/8116897414475\/WN_FOqxblVYR_GN9tRoQHJu_w<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/8116897414475\/WN_FOqxblVYR_GN9tRoQHJu_w\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"\/wp-content\/uploads\/2023\/07\/Linux-03-1-1024x535.png\" alt=\"Webinar: Air-Tight Security on Linux (German)\" class=\"wp-image-14310\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-03-1-1024x535.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-03-1-300x157.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-03-1-768x401.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-03-1-1536x803.png 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-03-1-2048x1070.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Find Release Notes for previous Linux versions <a href=\"\/en\/releasenotes#linux\" title=\"\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The key to a minimized attack surface is strengthening all weak points in your IT environment &#8211; and it&#8217;s not just Windows and macOS devices that need protecting.<\/p>\n","protected":false},"author":2,"featured_media":7758,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[279,278,96,106,280,281,153,104,105,67,47,68,275,277,276],"ppma_author":[9],"class_list":["post-14307","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-active-directory","tag-blocklisting","tag-elevation","tag-features","tag-freeipa","tag-ldap-domain","tag-linux","tag-operating-system","tag-os","tag-pam","tag-pre-approval","tag-privileged-access-management","tag-release","tag-sudo-session","tag-webinar","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Strengthen enterprise security with Admin By Request&#039;s multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"active directory,blocklisting,elevation,features,freeipa,ldap domain,linux,operating system,os,pam,pre-approval,privileged access management,release,sudo session,webinar\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Webinar: Air-Tight Security on Linux \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Strengthen enterprise security with Admin By Request&#039;s multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2023-07-20T22:51:03+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:46:57+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Webinar: Air-Tight Security on Linux \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Strengthen enterprise security with Admin By Request&#039;s multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#blogposting\",\"name\":\"Webinar: Air-Tight Security on Linux \\u00bb Admin By Request\",\"headline\":\"Webinar: Air-Tight Security on Linux\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Jammy-Jellyfish-Wallpaper-Dark.png\",\"width\":1920,\"height\":1080,\"caption\":\"Air-Tight security on Linux.\"},\"datePublished\":\"2023-07-20T22:51:03+00:00\",\"dateModified\":\"2026-01-25T07:46:57+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#webpage\"},\"articleSection\":\"Blogs, Active Directory, Blocklisting, Elevation, Features, FreeIPA, LDAP domain, Linux, Operating System, OS, PAM, Pre-Approval, Privileged Access Management, Release, Sudo Session, Webinar, S Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#listItem\",\"name\":\"Webinar: Air-Tight Security on Linux\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#listItem\",\"position\":3,\"name\":\"Webinar: Air-Tight Security on Linux\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux\",\"name\":\"Webinar: Air-Tight Security on Linux \\u00bb Admin By Request\",\"description\":\"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar & learn how to gain air-tight security on Linux.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Jammy-Jellyfish-Wallpaper-Dark.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux\\\/#mainImage\",\"width\":1920,\"height\":1080,\"caption\":\"Air-Tight security on Linux.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#mainImage\"},\"datePublished\":\"2023-07-20T22:51:03+00:00\",\"dateModified\":\"2026-01-25T07:46:57+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Webinar: Air-Tight Security on Linux \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Webinar: Air-Tight Security on Linux \u00bb Admin By Request","description":"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar & learn how to gain air-tight security on Linux.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"active directory,blocklisting,elevation,features,freeipa,ldap domain,linux,operating system,os,pam,pre-approval,privileged access management,release,sudo session,webinar","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#blogposting","name":"Webinar: Air-Tight Security on Linux \u00bb Admin By Request","headline":"Webinar: Air-Tight Security on Linux","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2021\/11\/Jammy-Jellyfish-Wallpaper-Dark.png","width":1920,"height":1080,"caption":"Air-Tight security on Linux."},"datePublished":"2023-07-20T22:51:03+00:00","dateModified":"2026-01-25T07:46:57+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#webpage"},"articleSection":"Blogs, Active Directory, Blocklisting, Elevation, Features, FreeIPA, LDAP domain, Linux, Operating System, OS, PAM, Pre-Approval, Privileged Access Management, Release, Sudo Session, Webinar, S Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#listItem","name":"Webinar: Air-Tight Security on Linux"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#listItem","position":3,"name":"Webinar: Air-Tight Security on Linux","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux","name":"Webinar: Air-Tight Security on Linux \u00bb Admin By Request","description":"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar & learn how to gain air-tight security on Linux.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2021\/11\/Jammy-Jellyfish-Wallpaper-Dark.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux\/#mainImage","width":1920,"height":1080,"caption":"Air-Tight security on Linux."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#mainImage"},"datePublished":"2023-07-20T22:51:03+00:00","dateModified":"2026-01-25T07:46:57+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Webinar: Air-Tight Security on Linux \u00bb Admin By Request","og:description":"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2023-07-20T22:51:03+00:00","article:modified_time":"2026-01-25T07:46:57+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Webinar: Air-Tight Security on Linux \u00bb Admin By Request","twitter:description":"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"14307","title":"#post_title #separator_sa #site_title","description":"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.","keywords":[],"keyphrases":{"focus":{"keyphrase":"Air-tight security on linux","score":90,"analysis":{"keyphraseInTitle":{"score":9,"maxScore":9,"error":0},"keyphraseInDescription":{"score":9,"maxScore":9,"error":0},"keyphraseLength":{"score":9,"maxScore":9,"error":0,"length":4},"keyphraseInURL":{"score":5,"maxScore":5,"error":0},"keyphraseInIntroduction":{"score":3,"maxScore":9,"error":1},"keyphraseInSubHeadings":[],"keyphraseInImageAlt":{"score":9,"maxScore":9,"error":0},"keywordDensity":{"type":"best","score":9,"maxScore":9,"error":0}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:07:35","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2023-07-20 22:51:04","updated":"2026-01-25 08:07:35"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tWebinar: Air-Tight Security on Linux\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Webinar: Air-Tight Security on Linux","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux"}],"authors":[{"term_id":9,"user_id":2,"is_guest":0,"slug":"sophie-admin","display_name":"S Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"S","job_title":"","description":"With a solid background in computer science and graphic design, my career kicked off writing tech manuals for various companies in both the software and hardware realms. I then side-stepped into marketing and found my passion in cybersecurity.\r\n\r\nI fuse my tech know-how with design skills to craft engaging blogs that spotlight cybersecurity for businesses. My main focus now is championing the marketing efforts of Admin By Request Zero Trust Platform, where my creative take on cybersecurity helps me create content that's enlightening, entertaining, and impactful.\r\n\r\nMy articles have graced the pages of InfoSec Magazine and top-tier security websites like OPSWAT. I'm on a mission to stress the significance of cybersecurity and to showcase how Admin By Request is shaking things up by making enterprise solutions simple, intuitive, accessible, and affordable to organizations of all sizes, in any industry.\r\n\r\nMy goal is to craft content that informs, intrigues, and motivates action, helping businesses understand the pivotal role of cybersecurity in the digital age we're now living in. Through my work, I aim to close the gap between technology and its real-world applications, keeping our audience well-informed, interested, and ready for the ever-evolving cybersecurity landscape.\r\n\r\nI bring a blend of extensive experience, deep expertise, recognized authority, and unwavering commitment to trustworthiness in cybersecurity. My goal? To make complex topics relatable and actionable for businesses of all sizes - just like Admin By Request strives to do."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=14307"}],"version-history":[{"count":1,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14307\/revisions"}],"predecessor-version":[{"id":14321,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14307\/revisions\/14321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/7758"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=14307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=14307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=14307"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=14307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}