BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

dod logo

Insider Threats Have Redefined Approach to Security

n an attempt to combat the issue of insider threats, the Department of Defense has tapped PARC, a Xerox company focused on innovation and R&D, to spearhead a new effort called the Graph Learning for Anomaly Detection using Psychological Context (GLAD-PC). The goal is to create technology that can automatically identify the possibility of a…

Post by Peter McCalister February 28, 2012
charliesheen-winning

February VEF Participant Takes Home a Kindle Fire.

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Post by Sarah Lieber February 28, 2012
Tags:
, , ,
rsa2012

3 Things To Look For At RSA 2012 In San Francisco

Yep, It’s that time of year again when everyone interested in protecting their IT assets across physical, virtual and cloud environments converge on Mascone Center in San Francisco for the annual RSA conference. Expect over 350 vendors/sponsors and 16,500 other attendees clamoring for 220+ sessions. The theme this year is “The great cipher mightier than…

Post by Peter McCalister February 27, 2012

Restoring/Undeleting a GPO

Have you ever needed to undelete or rollback a GPO, but realized you forgot to back it up or could not remember what changes were made to it? Well, we have had many customers with the same problem. That’s why BeyondTrust Recovery for Active Directory also supports group policy objects (GPO). When group policies are…

Post by Morgan Holm February 24, 2012
Tags:
, , , ,

Oops! Active Directory Recycle Bin Not Enabled

Just a reminder for all you PowerBroker Auditor users: to recover from accidental changes and deletions, simply find the event with the interactive console and click “Rollback.”

Post by Morgan Holm February 24, 2012
Tags:
, ,
rsa2012

Where Does Employee Trust Fit in Information Security

Next week I will be attending the RSA Conference in San Francisco. As a product management professional who enjoys investigating innovative emerging technologies, I decided to see what a few of the pre-show pundits had to say about the upcoming conference. I just finished listening to a Search Security podcast that discussed what the speakers…

Post by Peter McCalister February 24, 2012
balance1

Balancing Administrator Privileges for Help Desk Savings

Next week I will be attending the RSA Conference in San Francisco. As a product management professional who enjoys investigating innovative emerging technologies, I decided to see what a few of the pre-show pundits had to say about the upcoming conference. I just finished listening to a Search Security podcast that discussed what the speakers…

Post by Peter McCalister February 23, 2012
database

Top 10 Reasons To Implement Least Privilege For Apps & Databases

Taking a more tongue-in-cheek approach to highlighting the types of privilege misuse that occurs daily in applications and databases inside most organizations, I thought that a top-ten list approach might appeal to you as well. How may of these have you seen throughout your organization? #10—Sam, the CSO, can now sleep nights knowing that inappropriate…

Post by Peter McCalister February 22, 2012

10 Things You Should Know About PowerBroker Auditor for Active Directory

Rapid installation and minimal training with no reliance on native auditing tools Unmatched scalability and performance (“Our typical traffic volume is more than 1.5 million events per day and Blackbird has scaled-up effortlessly,” Josh Munn, Senior Systems Administrator, The University of Mississippi Medical Center) Real-time collection and alerting for active directory and group policy changes…

Post by Morgan Holm February 21, 2012
Tags:
, , ,
ca flag

The Proper Insider Threat Precautions Could Save You

The new California Data Breach Notification Bill (SB 24) mandating that holders of data notify consumers when their personal data has been breached went into effect at the beginning of this year. The bill has been in the works for several years and as the number of exposed personal records continues to climb (currently estimated…

Post by Peter McCalister February 21, 2012