BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

May, 2013

RPA-screenshot

Advanced Architectures with the Retina Protection Agent

Posted May 31, 2013    Morey Haber

One of the extended features of Retina CS is the Retina Protection Agent. This component is licensed with Retina and allows for users to assess hosts for vulnerabilities using a local scanning agent verses a network scan. This forgoes the need of a traditional SaaS or on-premise vulnerability assessment solution to perform a scan outside…

Tags:
, , , ,
monkey

Monkey HTTP Daemon Buffer Overflow

Disclosed May 30, 2013    Fully Patched
Vendors: Monkey HTTP Daemon Development Group
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
retinacs-dashboard

PowerBroker for Windows Policy Through Retina CS Web Services

Posted May 29, 2013    Morey Haber

PowerBroker for Windows has traditionally relied on Active Directory Group Policy to populate assets with the latest rules and policies. The technology also contains a utility for managing off-line systems called PBDeploy and has met the challenges for many organizations when a domain is not available for authentication. With the growing number of portable Windows…

Tags:
, , , , ,
native-tool-integration

Did you know? – Native tool integration

Posted May 29, 2013    Morgan Holm

Did you know about the native tool integration feature in the PowerBroker Management Suite?  PowerBroker solution functionality is available through the native Microsoft administration tools referred to as Remote Server Administration Tools (RSAT).  These are the tools that administrators use on a day to day basis to manage their environment. What is it? – It’s…

Tags:
, , ,
guy-stress-m

Do you want to do this the “hard” way?

Posted May 28, 2013    Mike Yaffe

Too often I see people working on what they can fix, what is easy. It’s like when I exercise, if I see progress I keep working at it but the problem areas (there are a lot of them) can wait until tomorrow. Over the past several years I see organizations doing a better job with…

Tags:
, , , , ,
zavio

Zavio IP Cameras Multiple Vulnerabilities

Disclosed May 28, 2013    Zeroday : 422 days
Vendors: Zavio
Vulnerability Severity: Medium
Exploit Impact: Remote Code Execution
Exploit Availability: Publicly Available
palosantosolutions

Elastix Multiple Cross-Site Scripting Vulnerabilities

Disclosed May 28, 2013    Zeroday : 422 days
Vendors: PaloSanto Solutions
Vulnerability Severity: Medium
Exploit Impact: Cross-Site Scripting
Exploit Availability: Publicly Available
PIM-DefaultCricklewood

The Integrity of Files and Privileged Identity Management

Posted May 27, 2013    Morey Haber

The concept of privilege identity management allows for the elevation of applications and operating system functions to authoritative users based on rules and policies. While the basic context of the user does not have permissions to perform these tasks, the rules and policies in place provide a vehicle for them to operate in a privileged…

Tags:
, , , , ,
PBW-session-viewer

Session Monitoring Provides Context Aware Security for Windows

Posted May 23, 2013    Morey Haber

The Windows world is about to get a long overdue lesson from Unix. Privilege Identity Management does not stop at just logging that an application gets launched with elevated privileges; administrators need to know what the user does with that application, as well. Did they use the program within the guidelines of company policy or…

Tags:
, , , , ,
novell

Novell Client Arbitrary Code Execution

Disclosed May 22, 2013    Fully Patched
Vendors: Novell
Vulnerability Severity: Medium
Exploit Impact: Elevation of Privilege
Exploit Availability: