BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Least Privilege Can Reduce Malware

Posted March 23, 2012    Peter McCalister

If you’re like most companies, you’ve invested heavily in antivirus software. But are you stillmalware security having to deal with the latest viruses, trojans, and ransomware? Are you having to wait until your AV provider can fix the latest bugs and get you the cure, while your network is left open and unprotected? Instead of asking why that is, there are better questions to ask. Like is there a way to prevent or limit malware from ever entering your IT environment.

To answer this question, you need to understand that most malware attacks are successful because the code hijacks administrator credentials of an individual or program, and uses those credentials to enter into the computer or network. This is a form of indirect misuse of privilege- because the owner of those credentials isn’t even aware they are responsible for the infection. And how does one prevent this misuse of privilege? The answer is pretty simple- don’t let all users run around with administrator credentials. Implementing a least privilege solution on physical, virtual, and cloud environments stops this problem in its tracks. Without administrator credentials, there are no access points to your company’s secure information.

The good news is that eliminating administrator credentials for your users doesn’t mean a change in productivity. With the correct solution and proper implementation, your employees will be able to do their jobs and more without the risk of malware and data breaches looming over your head. Click here for more information.

Leave a Reply

Additional articles

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Posted July 24, 2014    Morey Haber

There is a reason all BeyondTrust Privileged Account Management (PAM) solutions share the PowerBroker name: They all inherently enable you to reduce user-based risk and can be integrated under a centralized IT risk management platform. Here’s one common use case that demonstrates how this integration changes the playing field. Consider the challenge of privileged access:…

Tags:
, , , , ,
PowerBroker Password Safe Password Age Report

Reshaping Privileged Password Management with Password Safe 5.2

Posted July 21, 2014    Martin Cannard

Today, we’re pleased to unveil the latest edition of our privileged password management solution, PowerBroker Password Safe. I’ll start with a brief intro of what’s new and then tell you a little about the driving factors behind Password Safe development. New features for mitigating password risk and ensuring accountability enterprise-wide Here’s the 10,000-foot overview of…

Tags:
, , ,
PowerBroker for Windows tamper protection

PowerBroker for Windows 6.6 Tamper Protection

Posted July 18, 2014    Morey Haber

I have a bone to pick: Stopping an administrator from performing an action on a system is futile endeavor. As an administrator, there is always a way to circumvent a solution’s from tampered protection. Really! By default, Windows administrators have unrestricted access to the system – and even though an application, hardened configuration, or group policy…

Tags:
, ,