BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for July, 2013

New-Audit-Review-screenshot

Did you know? Create custom audit views and reports with PowerBroker Auditor for Active Directory

Did you know about the create custom audit views and reports feature in the PowerBroker Auditor for Active Directory solution?  Even though there are already around 200 built-in audit views that ship with the product organizations need to be able to target specific information for their environment and the task that is at hand. Needless…

Post by Morgan Holm July 31, 2013
Tags:
, , , , , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
pbps-full-list-pbps-manages-incl-systems-and-accounts

Top 10 Reasons You Need Privileged Account Management Now

Don’t under estimate the complexity organizations face with managing and sharing access to privileged accounts. BeyondTrust has a wide variety of solutions that address the various challenges of privileged accounts.  Here are 10 key reasons our customers need and value the PowerBroker Password Safe solution: 1. EVERYONE has trouble managing privileged passwords – While some…

Post by Paul Harper July 29, 2013
Tags:
, , , , , ,
certified-partner

New OPSWAT Certifications for BeyondTrust!

I know most of you out there think marketing is blinky pens, trade shows, and people who for the most part don’t know the first thing about the products they represent. I’d like to put those stereotypes to bed right now, as here at BeyondTrust we have NEVER had blinky pens…..we have flashing balls ;-)….

Post by Mike Yaffe July 23, 2013
Tags:
, , , ,

Controlling User Accounts and Regulatory Compliance

PCI DSS Requirement 8 requires that organizations must be able to identify and log all user and administrative access to information systems and applications containing credit card and personally identifiable information. In addition, environments must also have a unique ID for every individual that will have computer access to these systems.  This simple requirement can…

Post by Morey Haber July 15, 2013
Tags:
, , , , , , , , , , ,

July VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Post by Qui Cao July 15, 2013
retinacs-tierarchitecture

What can the Retina CS Threat Management Console do for me?

I am spending this week at the Microsoft Worldwide Partner Conference. It is a change for me. I am attending as a participant partner verses working the traditional conference trade show booth. This is relevant to the blog because as a I network with other partners, I find myself explaining BeyondTrust as a dynamic security…

Post by Morey Haber July 10, 2013
Tags:
, , , , , ,
patch-tuesday

July 2013 Patch Tuesday

July’s patch Tuesday fixes vulnerabilities in .NET, Windows, and Internet Explorer. There are a total of seven bulletins addressing 34 unique vulnerabilities; six bulletins are rated critical and one is rated important. MS13-052 addresses a TrueType font parsing vulnerability in .NET (CVE-2013-3129, also addressed in MS13-053 and MS13-054), as well as six other vulnerabilities. This…

Post by BeyondTrust Research Team July 9, 2013
Tags:
, ,
gold-star

Getting a gold star in compliance

You know I realize that I’m getting older after I lived through “this is gonna be the big year for PKI (heard that for 4 straight years, and I’m still waiting)”, or “everyone will have a digital certificate on all their credit cards next year”, or “security and compliance are two different things.” As for…

Post by Mike Yaffe July 9, 2013
Tags:
, , , , , , ,
sclogoupdated_1448

Our CTO Writes for SC Magazine’s Threat of the Month: SCADA “sport fishing”

Our CTO, Marc Maiffret wrote for the SC Magazine column,Threat of the Month: SCADA “sport fishing” section yesterday. Read an excerpt below and read the full article here. What is it? SCADA is not just a focus because of its often critical deployments, but also because performing vulnerability research on SCADA systems is easy, like…

Post by Sarah Lieber July 2, 2013
Tags:
, , , , , , , ,
BTU2

School is in Session

We’re proud to announce that we’ve scheduled the next installments of BeyondTrust University. BeyondTrust’s commitment to our customer’s success goes beyond the typical vendor/client relationship. To better serve our customers and partners who rely upon our privilege identity and vulnerability management solutions, we have developed a world-class training curriculum to complement our award-winning security and…

Post by Mike Puterbaugh July 1, 2013
Tags:
, , , ,