There are many security products,such as IBM TAMOS,CobraSonic osAegis,
who claim that they can constrain the permission of root.
So even though the hacker or some unauthorized users successfully su to root,
they can't act like root.They say this is a strong and solid protection mechanism.
How should we evaluate this protection mechanism?
Is this mechanism worth investment ?
Thanks in advance.