BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for May, 2013

RPA-screenshot

Advanced Architectures with the Retina Protection Agent

One of the extended features of Retina CS is the Retina Protection Agent. This component is licensed with Retina and allows for users to assess hosts for vulnerabilities using a local scanning agent verses a network scan. This forgoes the need of a traditional SaaS or on-premise vulnerability assessment solution to perform a scan outside…

Post by Morey Haber May 31, 2013
Tags:
, , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
retinacs-dashboard

PowerBroker for Windows Policy Through Retina CS Web Services

PowerBroker for Windows has traditionally relied on Active Directory Group Policy to populate assets with the latest rules and policies. The technology also contains a utility for managing off-line systems called PBDeploy and has met the challenges for many organizations when a domain is not available for authentication. With the growing number of portable Windows…

Post by Morey Haber May 29, 2013
Tags:
, , , , ,
native-tool-integration

Did you know? – Native tool integration

Did you know about the native tool integration feature in the PowerBroker Management Suite?  PowerBroker solution functionality is available through the native Microsoft administration tools referred to as Remote Server Administration Tools (RSAT).  These are the tools that administrators use on a day to day basis to manage their environment. What is it? – It’s…

Post by Morgan Holm May 29, 2013
Tags:
, , ,
guy-stress-m

Do you want to do this the “hard” way?

Too often I see people working on what they can fix, what is easy. It’s like when I exercise, if I see progress I keep working at it but the problem areas (there are a lot of them) can wait until tomorrow. Over the past several years I see organizations doing a better job with…

Post by Mike Yaffe May 28, 2013
Tags:
, , , , ,
PIM-DefaultCricklewood

The Integrity of Files and Privileged Identity Management

The concept of privilege identity management allows for the elevation of applications and operating system functions to authoritative users based on rules and policies. While the basic context of the user does not have permissions to perform these tasks, the rules and policies in place provide a vehicle for them to operate in a privileged…

Post by Morey Haber May 27, 2013
Tags:
, , , , ,
PBW-session-viewer

Session Monitoring Provides Context Aware Security for Windows

The Windows world is about to get a long overdue lesson from Unix. Privilege Identity Management does not stop at just logging that an application gets launched with elevated privileges; administrators need to know what the user does with that application, as well. Did they use the program within the guidelines of company policy or…

Post by Morey Haber May 23, 2013
Tags:
, , , , ,

May VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Post by Qui Cao May 21, 2013
retina-cs-calendar

Retina CS 4.5 – Calendars and Vulnerability Smart Rules

One of the many challenges facing Product Management today is addressing client feature requests. Often times, the request for a specific business problem does not translate to other customers or markets. Other times, the request is so complicated to explain, it takes multiple discussions to figure out the root problem and to figure out if…

Post by Morey Haber May 21, 2013
Tags:
, , , ,
session-viewer-pbw

Tech Tip: PowerBroker for Windows 6.0 Sneak Peek

Have you ever wanted to see what activities someone has performed inside one of your line-of-business apps for troubleshooting purposes? Maybe you just want to monitor what activities a network administrator performed on your Exchange Server to track down a configuration change. Well, we’ve got an exciting new feature in the upcoming release of PowerBroker…

Post by Peter Beauregard May 16, 2013
Tags:
, , , , ,
forbes-logo_featuredimage

How To Prepare For When The SEC Comes Asking About Cybersecurity Risk | BeyondTrust CEO Featured in Forbes

Our CEO John Mutch was recently invited to share his thoughts on an increasingly talked-about subject in the IT industry – the potential for the SEC to assume oversight over public companies cyber risk programs – in essence asking them to report on the viability of their security and compliance operations – in the face…

Post by Mike Puterbaugh May 15, 2013
Tags:
, , , , ,