Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

10 Things You Should Know About PowerBroker Auditor for Active Directory

Posted February 21, 2012    Morgan Holm
  1. Rapid installation and minimal training with no reliance on native auditing tools
  2. Unmatched scalability and performance (“Our typical traffic volume is more than 1.5 million events per day and Blackbird has scaled-up effortlessly,” Josh Munn, Senior Systems Administrator, The University of Mississippi Medical Center)
  3. Real-time collection and alerting for active directory and group policy changes
  4. Centralized audit analysis and reporting with role based access control
  5. Fully contextualized auditing views (Shows results in plain English, including before-and-after states of every event)
  6. A Rollback button to undo changes
  7. Granular searching and reporting at the attribute level
  8. Complete security and compliance library with support for custom reports
  9. Seamless integration into native tools and other Blackbird solutions
  10. Report scheduling and automated delivery
, , , ,

Leave a Reply

Additional articles


Closing the Vulnerability Gap

Posted October 7, 2015    Brian Chappell

Managing vulnerabilities is a significant challenge for many organizations. The main difficulties with managing this manifest in two key areas. The first is that the list isn’t static. The second is priority.


Scottrade Breach: Identified by Federal Officials

Posted October 5, 2015    Morey Haber

Late afternoon on October 2nd, news leaked out of another large security breach, now at Scottrade. The identity count of records, in the millions again (4.6 million is the latest). This breach comes on the second day of national CyberSecurity month, the first being Experian/T-Mobile breach.

3d image Data Breach issues concept word cloud background

Experian/T-Mobile Data Breach: When 2 Days is not Enough

Posted October 2, 2015    Morey Haber

On October 1, Experian admitted full responsibility for the loss of T-Mobile customer data. 15 million user records dating back to 2013 were effected in the breach, with data including sensitive information that may be decryptable like social security numbers and drivers licenses.