BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for February, 2012

eeye-451logos

Missed it Live? Watch the “Big Security Data” Webinar with 451 Research & eEye Here.

Recently, 451 Research and eEye hosted the webinar “Turning Your Big Security Data into a Big Advantage”. This discussion was on the topic of “Big Data” and how it relates to today’s security landscape. Featuring 451′s Andrew Hay, we covered how today’s enterprise IT and security teams can best leverage their ‘big security data’ to make…

Post by Sarah Lieber February 29, 2012
Tags:
, , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
lock

The Secret to Server Compliance (Hint: It’s Not Sudo)

Having spent many years in the software security space, I’m often reminded of how often the word security is paired with compliance – or even interchanged, as if they’re the same thing. Security and compliance are, of course, different things. Security is about ensuring the safety of a company’s assets, protecting sensitive data, ensuring that…

Post by Peter McCalister February 29, 2012
Wild, Wild West11

Surveying the Wild Wild West of Microsoft Server Administration

I was the on the phone with a large company discussing their requirements surrounding the control of administrator access to Microsoft based servers and applications. Within 5 minutes it became clear of where the folks on the phone stood: “managing our Microsoft servers is akin to the wild wild west”. In this company there are…

Post by Peter McCalister February 28, 2012

Complementing Privilege Identity Management (PIM) with the PowerBroker Management Suite

While BeyondTrust has provided audit and recovery solutions for Active Directory for years, we are now seeing an increase in customer inquiries about Privilege Identity Management (PIM) challenges. This growing demand continues to be driven by security and compliance concerns and the need to prevent internal data breaches through the use of privileged accounts. Active…

Post by Morgan Holm February 28, 2012
Tags:
, ,
dod logo

Insider Threats Have Redefined Approach to Security

n an attempt to combat the issue of insider threats, the Department of Defense has tapped PARC, a Xerox company focused on innovation and R&D, to spearhead a new effort called the Graph Learning for Anomaly Detection using Psychological Context (GLAD-PC). The goal is to create technology that can automatically identify the possibility of a…

Post by Peter McCalister February 28, 2012
charliesheen-winning

February VEF Participant Takes Home a Kindle Fire.

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Post by Sarah Lieber February 28, 2012
Tags:
, , ,
rsa2012

3 Things To Look For At RSA 2012 In San Francisco

Yep, It’s that time of year again when everyone interested in protecting their IT assets across physical, virtual and cloud environments converge on Mascone Center in San Francisco for the annual RSA conference. Expect over 350 vendors/sponsors and 16,500 other attendees clamoring for 220+ sessions. The theme this year is “The great cipher mightier than…

Post by Peter McCalister February 27, 2012

Restoring/Undeleting a GPO

Have you ever needed to undelete or rollback a GPO, but realized you forgot to back it up or could not remember what changes were made to it? Well, we have had many customers with the same problem. That’s why BeyondTrust Recovery for Active Directory also supports group policy objects (GPO). When group policies are…

Post by Morgan Holm February 24, 2012
Tags:
, , , ,

Oops! Active Directory Recycle Bin Not Enabled

Just a reminder for all you PowerBroker Auditor users: to recover from accidental changes and deletions, simply find the event with the interactive console and click “Rollback.”

Post by Morgan Holm February 24, 2012
Tags:
, ,
rsa2012

Where Does Employee Trust Fit in Information Security

Next week I will be attending the RSA Conference in San Francisco. As a product management professional who enjoys investigating innovative emerging technologies, I decided to see what a few of the pre-show pundits had to say about the upcoming conference. I just finished listening to a Search Security podcast that discussed what the speakers…

Post by Peter McCalister February 24, 2012