BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for October, 2010

The Cost Of Insider Attacks Can Be Mitigated

Insider attacks are possible because of the intentional misuse of privilege.

Post by Peter McCalister October 12, 2010

Identifying The 3 Misuses of Privilege

Identity and access management is typically looked at from the AAA perspective: Access, Authentication and Authorization.

Post by Peter McCalister October 11, 2010

The “3 Bears” of Privilege Identity Management

At some point in your life you have heard the story of Goldilocks and the Three Bears and learned the perils of extremism: too hot, too cold, just right.

Post by Peter McCalister October 8, 2010

Privileged Identity Management Demystified

In an effort to improve business security, compliance and productivity, privilege authorization policies must be redesigned and user permissions more granularly managed. Yet identity and access management (IAM) solutions have remained largely unchanged. Traditional solutions account for a significant part of the total cost of IAM, a staggering amount when you consider that these solutions:…

Post by Peter McCalister October 7, 2010