BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

2 Reasons Not To Build New Cloud Security Infrastructure

Post by Peter McCalister August 25, 2011

Last week I talked about the challenges of managing privileged identities in the cloud. As I have highlighted in an earlier post the recent report by the Ponemon Institute on the Security of Cloud Computing Providers shows that when it comes to security cloud providers are “least confident in their ability to restrict privileged user access to sensitive data”.

Today , we are helping our customers extend their existing insider security infrastructure, policies and compliance reporting to their private, public and hybrid clouds. Why extend what they have and not build a new cloud security infrastructure? Well I hear 2 primary reasons from customers.
First, It just works. Our primary datacenter infrastructure products PowerBroker for Servers, PowerBroker Database Monitor and Audit and PowerBroker Identity Services all have flexible architectures that allow them to be readily deployed in public, private and hybrid cloud environments. It’s all a matter of proper configuration of the networking to fit the difference in the clouds and to assure secure connections between the components and the infrastructure they are monitoring.

But the real benefit of extending their existing insider security infrastructure, policies and compliance reporting is it’s a tool that know . The systems engineering and admin teams know how to operate and maintain it. And perhaps more importantly the audit and compliance people have built their processes around it. Both groups have enough new things to learn in a move to the cloud, so why not reduce the barriers. Call us – we have helped many customers with cloud deployments and want to help more.

Leave a Reply

Additional articles

April VEF Participant Wins a Apple iPad mini

Every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization and a way to…

Post by Qui Cao April 24, 2014
smart rules manager for vulnerabilities - v2

A New Way of Looking at Vulnerabilities in Your Environment

Assets, users, vulnerabilities and exploits; all are common themes in my posts on BeyondInsight. With BeyondInsight v5.1, we unveiled a new way to view exploitable assets. Sure, most vulnerability management solutions link vulnerability data to exploit information, allowing tools like NeXpose and QualysGuard to list an asset, its vulnerabilities, and any related exploits. BeyondInsight does…

Post by Morey Haber April 23, 2014
Tags:
, , , , ,
smart rules manager for vulnerabilities

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in…

Post by Morey Haber April 21, 2014
Tags:
, , , , , ,