BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

If You Can’t Change It, You Can’t Govern It

Post by Peter McCalister July 27, 2011

Corporate governance ensures accountability across the extended enterprise. It facilitates staying competitive and satisfying ever-changing government regulations while providing mechanisms and controls to reduce the inefficiencies that arise when individuals misuse privileges granted to them.

A key aspect of corporate governance is ensuring that the changes decided by management are in fact enforced across every office and IT system despite geographic, network and operating system differences. This can be especially difficult for companies that grow through acquisition where newly acquired IT assets rarely match current corporate standards. Getting new policies rolled out and enforced. Without these types of controls, companies face the dire consequences already seen by the likes of Enron and MCI (formerly WorldCom). We have already discussed the intentional, accidental and indirect misuse of privilege in previous blog posts.

Implementing a privilege identity management solution can significantly impact corporate governance accountability and change management in real time across the extended enterprise as well as eliminate the misuse of privilege across heterogeneous systems, virtualized or even cloud-based administrators. Any change to privileged access can be accomplished from a centralized console and pushed to every environment in real-time. All entitlements and audit logs can also be reviewed on demand and therefore your company can ensure governance mandates.

Leave a Reply

Additional articles

BI-5.1-user-asset-visibility-img

Understanding Who Has Access to What with BeyondInsight v5.1

Today, it’s my pleasure to introduce you to BeyondInsight version 5.1, the latest release of our IT Risk Management platform, which unifies several of our solutions for Privileged Account Management and Vulnerability Management. BeyondInsight v5.1 embodies BeyondTrust’s mission to give our customers the visibility they need to make smart decisions and reduce risk to their…

Post by Morey Haber April 15, 2014
Tags:
, , , , , , , , , , , ,

PowerBroker for Unix & Linux Now Available via Web Services

This week BeyondTrust released a fully functional Web Services interface (REST API) for its PowerBroker for Unix & Linux product.  With this new feature users of the solution will now be able to remotely and securely configure and retrieve data via the API.  The Web Services interface implemented by BeyondTrust is an industry standard that…

Post by Paul Harper April 10, 2014
Tags:
, , , , ,

Heartbleed – When OpenSSL Breaks Your Heart

You’ve likely heard about the recent OpenSSL vulnerability, CVE-2014-0160, dubbed Heartbleed. The main takeaway of this vulnerability is that attackers can use this to obtain things like secret keys used for X.509 certificates, user names and passwords, instant messages, emails, and other highly sensitive information. For a technical analysis of the bug, check out this…

Post by BeyondTrust Research Team April 8, 2014
Tags:
, , ,