BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Born To Run…and Can Your Cloud Escape Injury?

Posted November 16, 2011    Peter McCalister

There’s a lot of hype in the running community over the 2009 book by Christopher McDougal, “Born To Run.” It has inspired a host of people–experienced runners and average Joes–to switch to barefoot running, where people where either nothing on their feet at all or some sort of minimalist shoe. The most headturning of these minimalist shoes have to be the Vibram Five Fingers shoes. You’ve seen them–they look like gloves for feet.

BTR cvr

I’m certainly no expert on running or barefoot running, but the jury still seems to be out on whether or not barefoot running is the right way to go. I recently heard from a podiatrist friend that he was seeing a significant increase in patients who had running injuries from the barefoot style. This has also been noted on sites like Competitor. The injuries seem to stem primarily from those runners who make a dramatic switch to barefoot running rather than making a gradual change.

So what does barefoot running have to do with desktop and server security technologies? Let me draw a parallel to cloud computing and new cloud initiatives. Frequently enterprise IT organizations embark on new cloud initiatives and often sink a lot of money into exploring the options available. Sometimes the rollout is underway before the planning phase has even gotten approval from the CIO.

With virtualization and the cloud getting all the hype these days, it’s certainly enticing to want to jump right in and start virtualizing everything. We know the benefits: pay for only what you use, greater reliability, replication of data, disaster recovery, etc. However, in many cases, the new cloud initiatives fail to examine the most important aspect of any virtual deployment–security.

Much like the barefoot runners who go all barefoot without a gradual entry and careful planning of their “migration” to the barefoot style, IT departments can essentially be “injured” by security breaches if they fail to properly secure their cloud environments.

Security in the private cloud starts at the hypervisor level. At BeyondTrust we’re primarily concerned with keeping insider threats–the threats posed by employees and internal trusted users. And, the best way to ensure that data in the private cloud stays secure and insider threats are kept at bay is to make sure that users are logging on to the hypervisors with their directory credentials.

From there, IT administrators can make sure that users are logging on to virtual machines–both desktops and servers–using their directory credentials provisioned in Active Directory. PowerBroker Identity Services features tools for securing desktops and servers–whether physical or virtual–and hypervisors. So don’t get caught up in the hype and end up with a cloud “injury.” Proper planning of your security and identity management is essential.

Leave a Reply

Additional articles

ovum-research

New Analyst SWOT Assessment Identifies Key Strengths of PowerBroker

Posted November 24, 2014    Scott Lang

Following on the heels of the Gartner PAM market guide and Frost & Sullivan review of Password Safe comes a new analyst review of our BeyondInsight and PowerBroker platforms, a SWOT assessment of BeyondTrust written by Ovum. Ovum’s honest and thorough review of BeyondTrust indicates that we are delivering, “…an integrated, one-stop approach to PAM….

Tags:
, , ,

Patented Windows privilege management brings you unmatched benefits

Posted November 24, 2014    Scott Lang

We are pleased to announce that BeyondTrust has been granted a new U.S. Patent (No. 8,850,549) for privilege management, validating our approach to helping our customers achieve least privilege in Windows environments. The methods and systems that we employ for controlling access to resources and privileges per process are unique to BeyondTrust PowerBroker for Windows….

Tags:
6

A Quick Look at MS14-068

Posted November 20, 2014    BeyondTrust Research Team

Microsoft recently released an out of band patch for Kerberos.  Taking a look at the Microsoft security bulletin, it seems like there is some kind of issue with Kerberos signatures related to tickets. Further information is available in the Microsoft SRD Blogpost So it looks like there is an issue with PAC signatures.  But what…

Tags:
, , , ,