BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Embrace your cloud with confidence and control!

Posted March 2, 2012    Peter McCalister

Security concerns continue to be top impediments to cloud adoption but business demands are pushing IT cloud initiatives forward. IT must meet business demands while keeping systems and data safe as they embrace cloud solutions.

At the RSA conference this week in San Francisco, cloud computing is top of mind. Much of the focus is on external threats but the internal threat of employees destroying critical data is an even broader security issue. Managing identity services and privileged access is critical for securing the cloud.

By implementing a comprehensive identity services solution you can integrate and maintain control of your cloud environment by leveraging your existing investment in Active Directory. This ensures that all your systems, including Linux and UNIIX systems, deployed in the cloud are integrated in Active Directory reducing the complexity of managing multiple identities and enabling single sign-on.

You can also increase control of your cloud with consistent policy-driven, role-based access controls that include monitoring, logging, and reporting for demonstrating compliance with regulatory requirements like PCI DSS, SOX, and HIPAA.

As you move to public, private or hybrid cloud, implement powerful identity services with privileged access management and take it with you to the cloud.

Go ahead. Embrace your cloud!

Leave a Reply

Additional articles

6

A Quick Look at MS14-068

Posted November 20, 2014    BeyondTrust Research Team

Microsoft recently released an out of band patch for Kerberos.  Taking a look at the Microsoft security bulletin, it seems like there is some kind of issue with Kerberos signatures related to tickets. Further information is available in the Microsoft SRD Blogpost So it looks like there is an issue with PAC signatures.  But what…

Tags:
, , , ,
Password Game Show

Managing Shared Accounts for Privileged Users: 5 Best Practices for Achieving Control and Accountability

Posted November 20, 2014    Scott Lang

How do organizations ensure accountability of shared privileged accounts to meet compliance and security requirements without impacting administrator productivity? Consider these five best practices…

Tags:
, , , , , ,
Triggering MS14-066

Triggering MS14-066

Posted November 17, 2014    BeyondTrust Research Team

Microsoft addressed CVE-2014-6321 this Patch Tuesday, which has been hyped as the next Heartbleed.  This vulnerability (actually at least 2 vulnerabilities) promises remote code execution in applications that use the SChannel Security Service Provider, such as Microsoft Internet Information Services (IIS). The details have been scarce.  Lets fix that. Looking at the bindiff of schannel.dll, we see a…

Tags:
, , , , ,