BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

ibm-bt-webinar-logo

Upcoming webinar with IBM | 5 ways to protect your sensitive data in the cloud

Please join us for a joint webcast featuring Ed Bottini, Cloud Ecosystem Program Director at IBM and Jim Zierick, EVP of Product Operations at BeyondTrust on June 26 at 9am-10am PDT. During this live webcast we’ll take a closer look at the needs that drive migration of data centers into the cloud, the role of…

Post by Peter McCalister June 12, 2012
patch-tuesday

Patch Tuesday June 2012: RDP broken, again. Stuxnet TTF, again.

This is shaping up to be an interesting Patch Tuesday with critical vulnerabilities being released across a combination of operating system components and client applications. In total there are 7 Microsoft Security Bulletins covering 26 distinct vulnerabilities in this June 2012 Microsoft Patch Tuesday. More than half of these vulnerabilities are rated as being likely…

Post by BeyondTrust Research Team June 12, 2012
Tags:
, , , , , ,
ibm-bt-webinar-logo

5 ways to protect your sensitive data in the cloud – webinar with IBM

In 2 weeks, we’ll be hosting a live webinar with IBM’s Ed Bottini, Cloud Ecosystem Program Director and our own, Jim Zierick, EVP of Product Operations to discuss ways to protect your sensitive data in the cloud. We know cloud security is on everybody’s mind so be sure to join us on Tuesday, June 26 at 9AM-10AM PDT….

Post by Sarah Lieber June 12, 2012
Tags:
, , , , , , ,
cloud-security-img

Sacrificing Security in the Cloud is Not an Option

A current trending decision for more and more organizations is the adoption of cloud services. Without a doubt, there are returnable benefits to this investment: competitive cost advantage, allowing budgets to focus on technology innovation rather than infrastructure, and considerable gains in time management. With anything valuable, in this case data, there are definite security…

Post by Peter McCalister June 11, 2012
linuxjournal-logo

Linux Journal Mentions PowerBroker Servers

We always like to share with our readers when we’ve received media coverage so today I wanted to share with you all our latest mention, in Linux Journal. The most recent issue of Linux Journal mentioned BeyondTrust’s PowerBroker Servers Enterprise product. Here’s what Linux Journal had to say about PowerBroker: “PowerBroker provides an intuitive GUI…

Post by Peter McCalister June 6, 2012
match-flame

Flame Malware Burns a Little Brighter

Did you know that Microsoft’s Terminal Server Licensing Service (we’ll call it TSLS for convenience) generated certificates that could be used to sign code? No? Neither did Redmond. Flame leveraged a “0day” (zero day) within TSLS to sign its own code, allowing it to appear as if the code came from Microsoft. This allowed Flame…

Post by Peter McCalister June 5, 2012
flame-98x98

Flame Burns a Little Brighter

Did you know that Microsoft’s Terminal Server Licensing Service (we’ll call it TSLS for convenience) generated certificates that could be used to sign code? No? Neither did Redmond. Flame leveraged a “0day” (zero day) within TSLS to sign its own code, allowing it to appear as if the code came from Microsoft. This allowed Flame…

Post by BeyondTrust Research Team June 4, 2012
Tags:
, , ,
WindowsITPro_200x58

Windows IT Pro Rates PowerBroker Desktop 4 out of 5 Stars

Windows IT Pro has published its review of PowerBroker Desktops, Windows Edition. The review is quite favorable and gave PowerBroker Desktop a 4 out of 5 star rating, saying PowerBroker Desktops is an easier way to protect users’ computers. An excerpt below: “PowerBroker does the heavy lifting for you. Instead of having to relax NTFS…

Post by Peter McCalister June 1, 2012
rsa-archer-egrc-2-680x393

Now Available! Direct Integration from Retina CS into RSA Archer eGRC

Yet another first for BeyondTrust and eEye Digital Security. Our combined companies are proud to release our first new direct integration from Retina CS into RSA Archer eGRC. The business value provides comprehensive vulnerability management data directly into Archer’s Threat Management system. Using direct database access from Archer’s Integration System, the eGRC platform harvests asset…

Post by Morey Haber June 1, 2012
Tags:
, , , , , ,
FlameRetardantSymbol-250x250

BeyondTrust’s CTO Develops A Handy Guide for Beating the Flame Malware

BeyondTrust’s CTO, Marc Maiffret, wrote up an insightful analysis of the Flame Malware and actions you can take now to identify, detect and remediate the vulnerabilities. Below is an excerpt: “The Flame malware is currently leveraging two older Microsoft vulnerabilities that have been patched since August and September of 2010 (specifically, that is Microsoft Security…

Post by Peter McCalister May 31, 2012