BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
cloud

The Evolving Threat Landscape

Posted May 18, 2012    Peter McCalister

With new vulnerabilities being exploited daily through desktop applications, employee-owned devices, remote computing, and social networks, protecting sensitive company assets can appear daunting. The boldness and inventiveness of hackers is outrunning companies’ ability to deal with them. According to DataLossDB.org, there were 1,030 publically disclosed data breach incidents in 2011. Theft of intellectual property from…

Categories:
General
microsoft

Windows XP Keyboard Layouts Pool Corruption Local Privilege Elevation

Disclosed May 18, 2012    No Patch Available
Vendors: Microsoft
Vulnerability Severity: Medium
Exploit Impact: Elevation of Privilege
Exploit Availability:
Categories:
Zeroday Tracker
VEF-March-newsletter-98x98

eEye’s May Patch Tuesday Assessment Now Available On Demand

Posted May 17, 2012    Sarah Lieber

Miss our live VEF webinar earlier this week? In case you did, I’ve put all of the content together for you below. Enjoy! Additionally, access this month’s Security Bulletin, a list of all the Audit IDs, and the PDF of the presentation. If you have additional questions you’d like to ask the research team about…

Categories:
Security Research
Tags:
, , , , , ,
acquisition-img4-98x98

BeyondTrust and eEye Acquisition Announcement Now On Demand

Posted May 17, 2012    Peter McCalister

There’s been a good amount of buzz surrounding our announcement that BeyondTrust acquired eEye Digital Security. We’re very excited about it and the opportunity the combined company has to provide an unmatched protection strategy for both the internal and external threats that target today’s enterprise.

Categories:
General
RiskMatrixbyVuln-5.14.12-98x98

Work Smarter with Retina Insight Threat Analyzers

Posted May 17, 2012    Morey Haber

It keeps happening over and over again. I speak to a prospect, and they do not want yet another vulnerability report with pages and pages of assets and vulnerabilities. Every tool vulnerability assessment scanner can produce this with various degrees of customization and consolidation but a 1,000 page report for a few dozen assets doesn’t…

Categories:
Vulnerability Management
Tags:
, , , , , ,
Picture 3

BeyondTrust and eEye Acquisition Announcement Now On Demand

Posted May 16, 2012    Sarah Lieber

There’s been a good amount of buzz surrounding our announcement that BeyondTrust acquired eEye Digital Security. We’re very excited about it and the opportunity the combined company has to provide an unmatched protection strategy for both the internal and external threats that target today’s enterprise. A couple of days ago, executives from both BeyondTrust and…

Categories:
General
Tags:
, , , , , ,
CustomAuditsAndroid1-680x607

Retina Now Offers Custom Audits for Android Devices

Posted May 16, 2012    Morey Haber

When a marketing buzz word sticks like BYOD (Bring Your Own Device), it is inevitable to see it everywhere in an effort to capitalize on the momentum; blogs, literature, SEO, social media, etc. In the past, we have seen great terms like “ecosystem”, “framework”, and my personal favorite “distributed computing”, rise and fall in marketing….

Categories:
Vulnerability Management
Tags:
, , , , ,
BT_2011

BeyondTrust Acquires eEye Digital Security

Posted May 10, 2012    Peter McCalister

This morning BeyondTrust announced that we have acquired eEye Digital Security, a well-respected leader in vulnerability and threat management. This is a very exciting move which will accelerate our existing company velocity in the security, compliance, and governance markets. Register for a webcast to learn more about BeyondTrust’s acquisition of eEye Digital Security. When BeyondTrust…

Categories:
General
thumb_default

eEye Digital Security Acquired by BeyondTrust

Posted May 10, 2012    Kevin Hickey

Earlier this morning we announced that eEye Digital Security has agreed to be acquired by BeyondTrust, the industry’s leading provider of Privileged Identity Management (PIM) solutions. This is a very exciting milestone in the history of eEye Digital Security, a company that has long been at the forefront of security product leadership and innovative security…

Categories:
General
lock

Is Your Organization Prepared Against Advanced Persistent Threats?

Posted May 9, 2012    Peter McCalister

An advanced persistent threat (APT) is an attack by which an unauthorized person gains access to the network and stays there undetected for a long period of time. The intent of an advanced persistent threat is often to steal data than to damage the network. Sectors with high-value information, such as defense, manufacturing, financial, telecom…

Categories:
General