BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

thumb_default

eEye Research Report: In Configuration We Trust

In configuration we trust. This statement couldn’t be truer to my research team and me, especially after discovering some of the findings in our latest report, which we publicly released last week. In the report, we describe simple configuration changes and software version upgrades that could mitigate many application vulnerabilities before patches are available. Some…

Post by Marc Maiffret May 9, 2011
Team

Customized Reporting: Just The Way You Like It

A solution can never have too many reports or can it ? I have seen products that have hundreds of reports and the titles and descriptions vary in just subtle ways using words like “sort by” or “group by”. Finding the one you need and that meets your business requirements can be a challenge and…

Post by Morey Haber May 9, 2011
sharing-300x273

Sharing Isn’t Always Caring Without Least Privilege

In kindergarten, we all learned an important lesson: how to share. Some people, as they grew up, seem to have taken this concept a little too far, with no real consideration for possible consequences. I’m not trying to undermine the importance of sharing as a general rule, but let’s just take a quick look at how sharing has “helped” in the recent past.

Post by Peter McCalister May 9, 2011
ducky

Life Is “Ducky” For Chief Security Officers

Ever see how a duck glides through water? It looks effortless from the surface, but beneath the waterline is a different story. In reality the poor duck is paddling his web feet feverishly in order to move about. Now you know what it’s like to be a Chief Security Officer managing today’s enterprise security requirements.

Post by Peter McCalister May 6, 2011
types-of-bone-fractures

Least Privilege is the Cure for Enterprise Injury

Have you ever really hurt yourself? Maybe broken a bone or torn a ligament? If your answer is yes, you’ll understand (all too well) when I say these injuries can hurt, cost a TON of money to fix, and sometimes happen in really embarrassing ways. Not surprisingly, bodily injuries aren’t the only wounds that can cause those consequences. Enterprise injury, specifically those caused by the misuse of privilege, can also be quite damaging in the exact same ways.

Post by Peter McCalister May 5, 2011
gold-bar

Logs – A Gold Mine of Information

In an earlier post I talked about tapping in to the power of the information in our privileged identity management system to improve productivity. Those detailed compliance logs you have been generating are a gold mine of information.

Post by Peter McCalister May 4, 2011
broken chain

Could Your Business Partners Be Your Weakest Link?

The drive for greater company-wide efficiencies and overall cost-savings has made the reality of outsourcing a significant part of 21st century business practices. But, by handing over your data and network access to third-parties, no matter how trustworthy, your enterprise could be at risk of suffering a serious and damaging data leak.

Post by Peter McCalister May 3, 2011
blowfish-98x98

Lessons Learned from Privileged Identity Management Mistakes

It never ceases to amaze me how predictable we are as human beings. Whether it’s continuing to repeat our own mistakes or thinking the consequences of others’ actions would never apply to us, it seems we’re far too eager to turn a blind eye to reality. Reality, however, has a funny way of coming back…

Post by Peter McCalister May 2, 2011
Tags:
, ,
img-mobile

Role-Based Access for Your Teams

Regulatory controls all require the access restriction of sensitive data to the individuals that need to know. Many corporate policies also segregate users to access devices by geographical location or by platform and function. Vulnerability data is sensitive information. In the wrong hands, it provides a blueprint on how to potentially access systems without proper…

Post by Morey Haber May 2, 2011
IK_RGB_72dpi

IK Investment Partners Selects PowerBroker for Desktops

IK Investment Partners, based in Europe, is a private equity firm that manages 5.7 billion Euros in fund commitments. Their portfolio includes 22 companies across Europe, and they have six dedicated investment teams covering the Benelux countries. They also have over 100 users on machines throughout the company, including laptops and desktops. IK Investment Partners…

Post by Peter McCalister April 29, 2011