BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Care New England Implements Least Privilege on Desktops

Posted January 21, 2011    Peter McCalister

Care New England, located in Providence Rhode Island is a non-for-profit healthcare system that offers a continuum of quality care, including two teaching hospitals affiliated with The Warren Alpert Medical School of Brown University, Butler and Women & Infants; a community hospital, Kent; a visiting nurse and home care/hospice agency, Care New England Home Health; and the Care New England Wellness Center. Care New England’s strengths are based on complementary programs and distinctive competencies of our partner hospitals to its partner hospitals and agencies.

With 10,000+ end users running as local administrators on 4,800 unsecured desktops, Care New England definitely had a compliance and security problem. Not only was their sensitive data in danger, but they were spending way too much money on expensive help desk costs. They needed a solution that would allow their users to run over 250 applications without elevated administrator rights, make their systems secure and compliant across different geographical locations, and minimize calls to the help desk. This is where BeyondTrust comes in.

Care New England selected Powerbroker Windows Desktop as the solution to their security and compliance needs. The software gives them the ability to centrally manage user rights and significantly reduce expensive calls to the help desk. In addition to saving the company money, Powerbroker for Desktops deployed easily for fast implementation. It also improved the security of Care New England, making the enterprise HIPAA compliant.

If you find your desktops vulnerable and noncompliant, like Care New England did, click here to read what Darren Mar-Elia has to say about making least privilege a best practice.

Leave a Reply

Additional articles

PBPS-screenshot-blog aug2014

Failing the Security Basics: Backoff Point-of-Sale Malware

Posted August 22, 2014    Marc Maiffret

At the beginning of this month, US-CERT issued a security alert relating to a string of breaches that had been targeting Point of Sale (POS) systems. The alert details that attackers were leveraging brute forcing tools to target common remote desktop applications such as Microsoft’s Remote Desktop, Apple Remote Desktop, Splashtop and LogMeIn among others….

Tags:
, , , , , ,

Troubleshooting Windows Privilege Management Rules with Policy Monitor

Posted August 21, 2014    Jason Silva

When defining and testing PowerBroker for Windows rules for production or pilots, customers sometimes tell us, “I don’t think this policy / program is working.” This is usually a case of the policy not properly triggering because of the way the rule was created. A unique feature of PowerBroker for Windows compared to other solutions is a client-side…

Tags:
, , ,
darren-mar-elia

BeyondTrust Webcast: Darren Mar-Elia’s 4 Active Directory Change Scenarios to Track

Posted August 20, 2014    Chris Burd

In our latest webcast, we joined Darren Mar-Elia, CTO at SDM Software, to discuss best practices for Active Directory (AD) change management. Here are some key takeaways from the presentation, followed by a link to a full-length video of the presentation. Mar-Elia kicks things off with a critical insight: that the best AD change management…

Tags:
, , , , , , ,