BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Greylisting Applications with PowerBroker for Windows Risk Compliance

Posted February 10, 2014    Morey Haber

PowerBroker for Windows is designed to elevate privileges on an application based on rules. It does so using technology that does not alter the user but rather the security token for the application at runtime. The results allow a standard user to launch and interact with an application that requires administrative privileges, without changing the user’s permissions. PBW policies and rules are created for any specific application, publisher, path, or a variety of other traits including their arguments and wildcards. Traditionally, these rules are black and white and do not consider the risk of the application itself. This concept is commonly known as greylisting and something no privileged identity vendor has been able to successfully integrate – until now.

PowerBroker for Windows 6.5 introduces a brand new paradigm for greylisting based on regulatory compliance and the associated vulnerabilities with an application. This new concept is patent-pending and called “Risk Compliance.” Traditional rules only pattern match an application for privileged elevation or application denial. Risk Compliance allows rules to be created based on violations to regulatory compliance initiatives and vulnerabilities publicly identified for that application. BeyondTrust has mapped, in real time, application-based vulnerabilities from the Retina vulnerability scanner to dynamically create PowerBroker Rules.

PBW-Risk Report

For instance, an administrator can create an application rule based vulnerabilities associated with HIPAA compliance that are over 30 days old and choose to send an alert, denial the application from launching, or restrict permissions of the application when it launches. Security best practices, and many regulations, dictate that critical vulnerabilities should be patched within 30 days (PCI DSS v3 for example). This type of rule would stop an at-risk system from launching the applications with excessive privileges until proper remediation is performed. In addition, extensive reports are available based on these rules to document which systems have application vulnerabilities that violate governance initiatives and what users and applications should not be utilized with administrative (or denied completely) until remediation is conducted.

PBW-Backup Report

PowerBroker for Windows Risk Compliance is a game changer. It provides real-time, application-based vulnerability assessment, privileged identity management, file integrity monitoring, session monitoring, and Windows event log monitoring all in one security agent. When the technology is used with the BeyondInsight IT Risk Management Platform, clients will benefit from the BeyondTrust vision of “Context Aware Security Intelligence” for user and asset risks.

For more information, check out our white paper “Powerbroker for Windows: Risk Compliance.”

Tags:
, , , , ,

Leave a Reply

Additional articles

CyberResiliency

6 things I like about Gartner’s Cyber Resiliency Strategy

Posted August 27, 2015    Nigel Hedges

There were 6 key principles, or recommendations, that Gartner suggested were important drivers towards a great cyber resiliency posture. I commented more than once during the conference that many of these things were not new. They are all important recommendations that are best when placed together and given to senior management and the board – a critical element of organisations that desperately need to “get it”.

Tags:
,
powerbroker-difference-1

Why Customers Choose PowerBroker: Flexible Deployment Options

Posted August 26, 2015    Scott Lang

BeyondTrust commissioned a study of our customer base in early 2015 to determine how we are different from other alternatives in the market. What we learned was that there were six key differentiators that separate BeyondTrust from other solution providers in the market. We call it the PowerBroker difference,

Tags:
, ,
Mac-Security-Enterprise

On Demand Webinar: Security Risk of Mac OS X in the Enterprise

Posted August 20, 2015    BeyondTrust Software

In the last several years, Mac administrators have come to realize that they may be just as vulnerable to exploits and malware as most other operating systems. New malware and adware is released all the time, and there have been serious vulnerabilities patched by Apple in the past several years, some of which may afford attackers full control of your systems.

Tags:
, ,