BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Control Access and Reduce Risk

Posted June 14, 2013    Bill Virtue

In my last blog I discussed bringing the NOC and SOC closer together, providing IT Operations with tools that improve security. This week I’ll go into more specifics of the solution and show how PowerBroker for Windows is used by both IT Operations and Security Operations teams.

The Challenge
Supporting a security principle such as Least Privilege which prescribes that a user only receive the privilege level required to complete authorized tasks can be complex for both IT Operations and Security Operations.

One of the challenges of implementing least privilege is understanding the environment with regard to application management. Questions surface such as, who are the users who need access to certain applications and of those, which [applications] will run without administrator privileges and how do you make these applications available to users who need them?

The Workaround
Applications often require administrative permissions to execute and therefore restrict users without these elevated privileges from accessing them. As a workaround a process is implemented to include administrator rights for users who need access to these applications which opens up other security related concerns. It’s all too common that users have administrator rights on local assets, which puts the entire enterprise at risk.

The Solution
Using PowerBroker for Windows (PBW) allows you to implement a least privilege environment, providing users with access to applications they need without, ‘elevating the user’. PBW reporting provides details which enables an understanding of which application’s required permissions, who is running these applications, how often, and much more. Having this additional context allows you to make more effective security decisions. Reports can be assigned and reviewed by IT / application management and operations teams to determine business needs and rules can be created directly from the PBW Reporting console and implemented by IT, placing them in the PowerBroker GPO snap-in or delivered directly to the client over a secured internet connection.

PowerBroker-img1

PowerBroker for Windows Reporting and Auditing can also be used to identify vulnerability data for applications running in your environment. This allows the Security Operations team to identify risks associated with elevating or even allowing to run applications on your endpoints or servers.

PowerBroker-Events-Img2

 

Summary
BeyondTrust’s Context Aware Security Intelligence delivers a unique and powerful perspective to allow IT Operations and Security Operations teams to collaborate using a business-oriented approach to providing access to applications while promoting a secure environment.

About BeyondTrust
At BeyondTrust, we offer a well-rounded suite of products that fit nicely into your current infrastructure and help you accomplish these steps in a single platform. Imagine being able to provide the required rights of an application or seeing what software users have installed post image. And, before you do anything with an application, determine how safe it is before it executes in your organization; PowerBroker for Windows does this.

As an information technology security professional, you may want a full scan of your enterprise for vulnerabilities, and package updates to be pushed out via SCCM or WSUS; these can be done with Retina.

Finally, there may be a requirement to audit changes made to Active Directory, Exchange, or even MS SQL, and quickly roll back changes that may be accidental; PowerBroker Auditor is a great solution for this.

For more information on how BeyondTrust can solve these problems, and many more, please visit us on the web.

Tags:
, , , , , ,

Leave a Reply

Additional articles

ovum-research

New Analyst SWOT Assessment Identifies Key Strengths of PowerBroker

Posted November 24, 2014    Scott Lang

Following on the heels of the Gartner PAM market guide and Frost & Sullivan review of Password Safe comes a new analyst review of our BeyondInsight and PowerBroker platforms, a SWOT assessment of BeyondTrust written by Ovum. Ovum’s honest and thorough review of BeyondTrust indicates that we are delivering, “…an integrated, one-stop approach to PAM….

Tags:
, , ,

Patented Windows privilege management brings you unmatched benefits

Posted November 24, 2014    Scott Lang

We are pleased to announce that BeyondTrust has been granted a new U.S. Patent (No. 8,850,549) for privilege management, validating our approach to helping our customers achieve least privilege in Windows environments. The methods and systems that we employ for controlling access to resources and privileges per process are unique to BeyondTrust PowerBroker for Windows….

Tags:
6

A Quick Look at MS14-068

Posted November 20, 2014    BeyondTrust Research Team

Microsoft recently released an out of band patch for Kerberos.  Taking a look at the Microsoft security bulletin, it seems like there is some kind of issue with Kerberos signatures related to tickets. Further information is available in the Microsoft SRD Blogpost So it looks like there is an issue with PAC signatures.  But what…

Tags:
, , , ,