BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Born To Run…and Can Your Cloud Escape Injury?

Posted November 16, 2011    Peter McCalister

There’s a lot of hype in the running community over the 2009 book by Christopher McDougal, “Born To Run.” It has inspired a host of people–experienced runners and average Joes–to switch to barefoot running, where people where either nothing on their feet at all or some sort of minimalist shoe. The most headturning of these minimalist shoes have to be the Vibram Five Fingers shoes. You’ve seen them–they look like gloves for feet.

BTR cvr

I’m certainly no expert on running or barefoot running, but the jury still seems to be out on whether or not barefoot running is the right way to go. I recently heard from a podiatrist friend that he was seeing a significant increase in patients who had running injuries from the barefoot style. This has also been noted on sites like Competitor. The injuries seem to stem primarily from those runners who make a dramatic switch to barefoot running rather than making a gradual change.

So what does barefoot running have to do with desktop and server security technologies? Let me draw a parallel to cloud computing and new cloud initiatives. Frequently enterprise IT organizations embark on new cloud initiatives and often sink a lot of money into exploring the options available. Sometimes the rollout is underway before the planning phase has even gotten approval from the CIO.

With virtualization and the cloud getting all the hype these days, it’s certainly enticing to want to jump right in and start virtualizing everything. We know the benefits: pay for only what you use, greater reliability, replication of data, disaster recovery, etc. However, in many cases, the new cloud initiatives fail to examine the most important aspect of any virtual deployment–security.

Much like the barefoot runners who go all barefoot without a gradual entry and careful planning of their “migration” to the barefoot style, IT departments can essentially be “injured” by security breaches if they fail to properly secure their cloud environments.

Security in the private cloud starts at the hypervisor level. At BeyondTrust we’re primarily concerned with keeping insider threats–the threats posed by employees and internal trusted users. And, the best way to ensure that data in the private cloud stays secure and insider threats are kept at bay is to make sure that users are logging on to the hypervisors with their directory credentials.

From there, IT administrators can make sure that users are logging on to virtual machines–both desktops and servers–using their directory credentials provisioned in Active Directory. PowerBroker Identity Services features tools for securing desktops and servers–whether physical or virtual–and hypervisors. So don’t get caught up in the hype and end up with a cloud “injury.” Proper planning of your security and identity management is essential.

Leave a Reply

Additional articles

dave-shackleford-headshot

Why You Still Suck at Patching…and How to Turn Your Life Around

Posted March 25, 2015    Dave Shackleford

Live webinar | March 26, 2015 | 10am PT/1pm ET | Dave Shackleford, SANS Instructor | Why You Still Suck at Patching…and How to Turn Your Life Around

Tags:
, ,
infographic

Privilege Gone Wild 2: Over 25% of Organizations Have No Privileged Access Controls

Posted March 24, 2015    Scott Lang

BeyondTrust recently conducted a survey, with over 700 respondents, to explore how organizations view the risk of misuse from privileged account misuse, as well as trends in addressing and mitigating those risks.

Tags:
,
webinar_ondemand

On Demand Webinar – A Security Expert’s Guide: The Windows Events You Should be Tracking and Why

Posted March 23, 2015    Lindsay Marsh

On-Demand Webinar – Windows Security Expert and MCSE, Russell Smith, discusses the Windows Events you should be tracking right now and why. He will also show you how to set up Event Log subscriptions so you have better monitoring across your Windows environments.

Tags:
, ,