BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

BeyondSaaS-vulnerabilitiesrootcause3

Staring At The Clouds… BeyondSaaS

Daydreamers tend to stare at the clouds and imagine entities from the shapes they see. Our minds form relationships from the bulges, wedges, and puffy forms to make animals, star ships, and people. From the clouds looking down, we see roads, farms, buildings, and all the physical entities we interact with everyday. For our information…

Post by Morey Haber February 11, 2014
Tags:
, , , ,
PBW-Risk Report

Greylisting Applications with PowerBroker for Windows Risk Compliance

PowerBroker for Windows is designed to elevate privileges on an application based on rules. It does so using technology that does not alter the user but rather the security token for the application at runtime. The results allow a standard user to launch and interact with an application that requires administrative privileges, without changing the…

Post by Morey Haber February 10, 2014
Tags:
, , , , ,
combined-executive-dashboard

BeyondInsight Reports: All The Difference In The World

Last week, we announced the release of the BeyondInsight IT Risk Management Platform, which provides a central environment for managing several of our PowerBroker Privileged Account Management and Retina Vulnerability Management solutions. A quick look at the BeyondInsight Analytics and Reporting module uncovers a startling revelation for our competitors and a hidden gem for our…

Post by Morey Haber February 7, 2014
Tags:
, , , , , ,
scmag1-98x98

BeyondTrust Receives 5 Star Rating from SC Magazine

Recently our UVM20 Security Management Appliance received a perfect 5-star review + “Best Buy” recognition from SC Magazine. Read the full review here. The UVM20 includes several pre-installed and pre-configured solutions: Retina Network Security Scanner, PowerBroker for UNIX/Linux, and PowerBroker for Windows, plus our patch management, regulatory reporting and configuration compliance modules — in addition…

Post by Sarah Lieber February 4, 2014
Tags:
, , , , , , , ,
5things-oraclebtwebinar-screenshot

The 5 Things Every Linux Administrator Should (and Should Not) Do When It Comes to Privileged Account Management

When it comes to privileged account management the list of things an administrator can do to protect their environment is seemingly never ending. Last week we hosted a webinar with Oracle Linux and presented a list of 5 things every Linux administrator should, and should not, do when managing privileged accounts. Given the current security…

Post by Sarah Lieber February 3, 2014
Tags:
, , , , ,
jawbone-up

We’re Getting Pumped up for RSA

Here at BeyondTrust we’re getting pumped up for RSA, which takes place Feb 24th – 27th, 2014! This year in San Francisco we’re going to demonstrate how our PowerBroker Privilege Management and Retina Vulnerability Management solutions ensure that IT environments are healthy and ready to fend off threats. We’ll also be featuring some amazing “feats…

Post by Sarah Lieber January 30, 2014
Tags:
, , , , ,
Target

Retina Audits for Target POSRAM Malware

By now, you’ve heard of the POSRAM malware used against retail giant Target to steal customers’ payment card information from point-of-sale terminals. If you have not heard of POSRAM, or are unfamiliar with how it works, the malware scans processes’ memory for credit card information and periodically uploads that information to an attacker controlled server….

Post by BeyondTrust Research Team January 29, 2014

Retina Performs Continuous Vulnerability Assessment

SANS Critical Control 4 specifies criteria for continuous vulnerability assessment and remediation. This specification calls for vulnerabilities to be continuously assessed, correlated, and reported upon in real-time based on public disclosure and identification of new or changed assets. Critical Control 4 is mandated by many government agencies, and requires prompt automated remediation that adheres to…

Post by Morey Haber January 28, 2014
Tags:
, , , ,
marc-maiffret-fox-news-screenshot

Marc Maiffret Interviewed on Fox News: How Safe is Consumer Data on the ObamaCare Website?

Yesterday, Marc Maiffret appeared as a special guest of “The Willis Report” on Fox News where he discussed how safe consumer data is on the ObamaCare website. As background, according to news reports, ObamaCare continues to leave consumer data vulnerable to theft months after security problems were first exposed. In the wake of a Christmas-season…

Post by Mike Yaffe January 17, 2014
Tags:
, , , ,
patch-tuesday

January 2014 Patch Tuesday

Welcome to 2014! This month is a light month for Patch Tuesday bulletins. Microsoft has released patches for Microsoft Word and Office Web Apps, the Windows Kernel (and drivers), and Microsoft Dynamics AX. There are a total of four bulletins addressing six unique vulnerabilities; all of which are rated as important. The NDProxy zero-day vulnerability…

Post by BeyondTrust Research Team January 14, 2014
Tags:
, , ,