BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Control Access and Reduce Risk

Posted June 14, 2013    Bill Virtue

In my last blog I discussed bringing the NOC and SOC closer together, providing IT Operations with tools that improve security. This week I’ll go into more specifics of the solution and show how PowerBroker for Windows is used by both IT Operations and Security Operations teams.

The Challenge
Supporting a security principle such as Least Privilege which prescribes that a user only receive the privilege level required to complete authorized tasks can be complex for both IT Operations and Security Operations.

One of the challenges of implementing least privilege is understanding the environment with regard to application management. Questions surface such as, who are the users who need access to certain applications and of those, which [applications] will run without administrator privileges and how do you make these applications available to users who need them?

The Workaround
Applications often require administrative permissions to execute and therefore restrict users without these elevated privileges from accessing them. As a workaround a process is implemented to include administrator rights for users who need access to these applications which opens up other security related concerns. It’s all too common that users have administrator rights on local assets, which puts the entire enterprise at risk.

The Solution
Using PowerBroker for Windows (PBW) allows you to implement a least privilege environment, providing users with access to applications they need without, ‘elevating the user’. PBW reporting provides details which enables an understanding of which application’s required permissions, who is running these applications, how often, and much more. Having this additional context allows you to make more effective security decisions. Reports can be assigned and reviewed by IT / application management and operations teams to determine business needs and rules can be created directly from the PBW Reporting console and implemented by IT, placing them in the PowerBroker GPO snap-in or delivered directly to the client over a secured internet connection.

PowerBroker-img1

PowerBroker for Windows Reporting and Auditing can also be used to identify vulnerability data for applications running in your environment. This allows the Security Operations team to identify risks associated with elevating or even allowing to run applications on your endpoints or servers.

PowerBroker-Events-Img2

 

Summary
BeyondTrust’s Context Aware Security Intelligence delivers a unique and powerful perspective to allow IT Operations and Security Operations teams to collaborate using a business-oriented approach to providing access to applications while promoting a secure environment.

About BeyondTrust
At BeyondTrust, we offer a well-rounded suite of products that fit nicely into your current infrastructure and help you accomplish these steps in a single platform. Imagine being able to provide the required rights of an application or seeing what software users have installed post image. And, before you do anything with an application, determine how safe it is before it executes in your organization; PowerBroker for Windows does this.

As an information technology security professional, you may want a full scan of your enterprise for vulnerabilities, and package updates to be pushed out via SCCM or WSUS; these can be done with Retina.

Finally, there may be a requirement to audit changes made to Active Directory, Exchange, or even MS SQL, and quickly roll back changes that may be accidental; PowerBroker Auditor is a great solution for this.

For more information on how BeyondTrust can solve these problems, and many more, please visit us on the web.

Tags:
, , , , , ,

Leave a Reply

Additional articles

Restricted Area Sign

Implementing Least Privilege for Windows the Easy Way

Posted July 31, 2014    Morey Haber

The concept of least privilege states that asset users should have the lowest level of access privileges required to effectively conduct their jobs. Implementing least privilege can bring several benefits to your organization, including: Increased security by reducing the attack surface available to users and to potential attackers who compromise user systems via phishing, malware,…

Tags:
, , ,
gartner market guide image - aug 2014

Introducing the Gartner Market Guide for Privileged Account Management

Posted July 29, 2014    Chris Burd

Gartner recently released a new Market Guide for Privileged Account Management (PAM), and we’d like to share a complimentary copy with you. The report includes PAM market analysis and direction, vendor overviews, and recommendations for selecting PAM solutions for your environment. BeyondTrust is one of two representative vendors (out of 20) to address all solution…

Tags:
, , , , , , , ,
Integrating Least Privilege and Password Management to Solve Account Security Challenges

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Posted July 24, 2014    Morey Haber

There is a reason all BeyondTrust Privileged Account Management (PAM) solutions share the PowerBroker name: They all inherently enable you to reduce user-based risk and can be integrated under a centralized IT risk management platform. Here’s one common use case that demonstrates how this integration changes the playing field. Consider the challenge of privileged access:…

Tags:
, , , , ,