BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

MD Anderson Selects PowerBroker for Servers

Posted March 22, 2011    Peter McCalister

The University of Texas M.D. Anderson Cancer Center is a world-leading intitution for cancer treatment. In 2008 alone, the facility cared for nearly one million people, and it supports a faculty and staff of both MDs and PhDs numbering over 20,000. Their IT network is based on a powerful and secure Unix infrastructure, and includes over 500 servers that house confidential patient and financial information.

As with any healthcare institution, MD Anderson was required to comply with the Health Insurance Portability and Accountability Act (HIPAA) requirements. Among the mandates that needed to be addressed were acces control, root delegation, and auditing capabilities for the massive information network. The company’s primary goal was to place controls back into the hands of system administrators. This is where BeyondTrust software comes in.

BeyondTrust’s PowerBroker for Servers was implemented to protect root accounts from users who might intentionally (or unintentionally) gain access and abuse confidential data. It sits on top of M.D. Anderson’s Unix Servers, and provides security and accountability by enabling systems administrators to delegate administrative privileges without disclosing the root password. In addition to this, it provides extensive auditing and logging features. By appyling PowerBroker for Servers, The University of Texas M.D. Anderson Cancer Center was able to make their IT network secure and compliant.

On a personal note I have to say that I respect MDA imensely as they have helped keep my mom’s leukemia in check for the last 3 years.

If you find your IT environment vulnerable and noncompliant, click here to read about how your network can become secure. You can also read the entire case study here.

Leave a Reply

Additional articles

normal-blog-img

New IT Security Best Practices for Maintaining “Business as Usual” Despite Evolving Threats

Posted August 13, 2014    Morey Haber

It’s time to get back to business. Here in the U.S., summer vacations are wrapping up and businesses are looking forward to closing out 2014. Over the past year, we’ve seen several incidents that warrant changes in the ways consumers make purchases and businesses conduct transactions. Consider last week’s theft of a whopping 1.2 billion…

Tags:
, , ,

Retina Vulnerability Audits – August 2014 Patch Tuesday

Posted August 12, 2014    BeyondTrust Research Team

The following is a list of Retina vulnerability audits for this August 2014 Patch Tuesday: MS14-043 - Vulnerability in Windows Media Center Could Allow Remote Code Execution (2978742) 34924 – Microsoft WMC Remote Code Execution (2978742) MS14-044 - Vulnerabilities in SQL Server Could Allow Elevation of Privilege (2984340) 34915 – Microsoft SQL Server Multiple Vulnerabilities (2984340) – 2008 34916 –…

patch-tuesday

August 2014 Patch Tuesday

Posted August 12, 2014    BeyondTrust Research Team

This August Microsoft has released nine security bulletins which account for a whole variety of critical vulnerabilities. The most critical bulletins are MS14-051 (Internet Explorer), MS14-045 (Kernel-mode), and MS14-049 (Windows Installer). MS14-043 fixes a critical code execution vulnerability within Windows Media Center (people still use that?). The vulnerability itself is specifically within a COM object…

Tags:
, , ,