Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

2 Reasons Not To Build New Cloud Security Infrastructure

Posted August 25, 2011    Peter McCalister

Last week I talked about the challenges of managing privileged identities in the cloud. As I have highlighted in an earlier post the recent report by the Ponemon Institute on the Security of Cloud Computing Providers shows that when it comes to security cloud providers are “least confident in their ability to restrict privileged user access to sensitive data”.

Today , we are helping our customers extend their existing insider security infrastructure, policies and compliance reporting to their private, public and hybrid clouds. Why extend what they have and not build a new cloud security infrastructure? Well I hear 2 primary reasons from customers.
First, It just works. Our primary datacenter infrastructure products PowerBroker for Servers, PowerBroker Database Monitor and Audit and PowerBroker Identity Services all have flexible architectures that allow them to be readily deployed in public, private and hybrid cloud environments. It’s all a matter of proper configuration of the networking to fit the difference in the clouds and to assure secure connections between the components and the infrastructure they are monitoring.

But the real benefit of extending their existing insider security infrastructure, policies and compliance reporting is it’s a tool that know . The systems engineering and admin teams know how to operate and maintain it. And perhaps more importantly the audit and compliance people have built their processes around it. Both groups have enough new things to learn in a move to the cloud, so why not reduce the barriers. Call us – we have helped many customers with cloud deployments and want to help more.

Leave a Reply

Additional articles


Answering the age-old question, ‘What’s plugged into my network?’

Posted October 9, 2015    Alejandro DaCosta

“What’s plugged into my network?” is a question I hear frequently from security administrators. And, really, it’s no surprise why. No longer do we have to account just for the physical servers in our datacenters, workstations and a few network devices. Now we need to keep track of roaming laptops, dynamic virtual systems, off-site cloud deployments and BYOD.


Closing the Vulnerability Gap

Posted October 7, 2015    Brian Chappell

Managing vulnerabilities is a significant challenge for many organizations. The main difficulties with managing this manifest in two key areas. The first is that the list isn’t static. The second is priority.


Scottrade Breach: Identified by Federal Officials

Posted October 5, 2015    Morey Haber

Late afternoon on October 2nd, news leaked out of another large security breach, now at Scottrade. The identity count of records, in the millions again (4.6 million is the latest). This breach comes on the second day of national CyberSecurity month, the first being Experian/T-Mobile breach.