BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for February, 2014

SCAPblog-img2

Going Beyond SCAP for Benchmark Compliance

SCAP configuration compliance assessments, commonly referred to as “Benchmark” assessments, are traditionally cumbersome tasks when multiple benchmarks have to be tested against multiple targets at the same time. For the vast majority of SCAP-certified tools, this means executing one benchmark at a time against a valid host(s) and reviewing the results. The same targets often…

Post by Morey Haber February 24, 2014
Tags:
, , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE

Congratulation to our January and February VEF Participants

Every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization and a way to…

Post by Qui Cao February 20, 2014

BeyondInsight: Privilege and Vulnerability Management Unification

Fifteen years ago there was a revolution in information technology operations. Different teams that managed networks and systems merged their practices and technology under frameworks like Computer Associates Unicenter and IBM Tivoli. Today, these solutions have evolved to CA Spectrum, SolarWinds, and SpiceWorks. These are all fantastic technologies that have proven that the fusion of…

Post by Morey Haber February 18, 2014
Tags:
, , , , , ,
Access-Report1

Neophytes and Professionals

There is a first time for everything. Your first steps, your first date, your first child, your first vulnerability assessment scan. A first time for everything. The Retina Network Security Scanner Unlimited makes taking the first step incredibly easy and affordable. For security professionals, it is just another step in making sure your assets are…

Post by Morey Haber February 14, 2014
Tags:
, , , ,

Least Privilege on Windows Desktops and Servers

We have all seen the news. Least privilege attacks on the NSA and companies like Target have lead to elevated privileges on sensitive systems and access to confidential data. Securing administrative privileges on desktops and servers is beginning to take center stage for many organizations since low level entry points are now being used to…

Post by Morey Haber February 13, 2014
Tags:
, , , ,
patch-tuesday

February 2014 Patch Tuesday

February’s Patch Tuesday comes to us with patches for XML Core Services, IPv6, Direct2D, Forefront, .NET, Internet Explorer, and VBScript. There are a total of seven bulletins (4 critical, 3 important) addressing 31 unique vulnerabilities. Most notable this month is the patch for Internet Explorer, MS14-010, which fixes 24 vulnerabilities: over two thirds of this…

Post by BeyondTrust Research Team February 11, 2014
Tags:
, , ,
BeyondSaaS-vulnerabilitiesrootcause3

Staring At The Clouds… BeyondSaaS

Daydreamers tend to stare at the clouds and imagine entities from the shapes they see. Our minds form relationships from the bulges, wedges, and puffy forms to make animals, star ships, and people. From the clouds looking down, we see roads, farms, buildings, and all the physical entities we interact with everyday. For our information…

Post by Morey Haber February 11, 2014
Tags:
, , , ,
PBW-Risk Report

Greylisting Applications with PowerBroker for Windows Risk Compliance

PowerBroker for Windows is designed to elevate privileges on an application based on rules. It does so using technology that does not alter the user but rather the security token for the application at runtime. The results allow a standard user to launch and interact with an application that requires administrative privileges, without changing the…

Post by Morey Haber February 10, 2014
Tags:
, , , , ,
combined-executive-dashboard

BeyondInsight Reports: All The Difference In The World

Last week, we announced the release of the BeyondInsight IT Risk Management Platform, which provides a central environment for managing several of our PowerBroker Privileged Account Management and Retina Vulnerability Management solutions. A quick look at the BeyondInsight Analytics and Reporting module uncovers a startling revelation for our competitors and a hidden gem for our…

Post by Morey Haber February 7, 2014
Tags:
, , , , , ,
scmag1-98x98

BeyondTrust Receives 5 Star Rating from SC Magazine

Recently our UVM20 Security Management Appliance received a perfect 5-star review + “Best Buy” recognition from SC Magazine. Read the full review here. The UVM20 includes several pre-installed and pre-configured solutions: Retina Network Security Scanner, PowerBroker for UNIX/Linux, and PowerBroker for Windows, plus our patch management, regulatory reporting and configuration compliance modules — in addition…

Post by Sarah Lieber February 4, 2014
Tags:
, , , , , , , ,