BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Marc-CNN-Facebook

Our CTO Interviewed on CNN: Man exposes Facebook security flaw

Marc Maiffret spoke on CNN earlier today about the Palestinian IT specialist, Khalil Shreateh, who exposed a Facebook security flaw and due to miscommunication, was not awarded a bounty for his work. A quick excerpt and a link to the interview are below. “He found a great vulnerability in Facebook, he tried to report it responsibly in…

Post by Sarah Lieber August 19, 2013
Tags:
, , , , , ,

August VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Post by Qui Cao August 19, 2013
Tags:
, , , , , , , , , , ,
patch-tuesday

August 2013 Patch Tuesday

Just a little over one week after hackers flooded Vegas for BlackHat and Defcon, August’s Patch Tuesday greets us with eight bulletins: three critical and five important. Software fixed this month includes Internet Explorer, Exchange, Windows, and Active Directory. MS13-059 addresses 11 privately disclosed vulnerabilities, including multiple memory corruptions, an information disclosure, and a privilege…

Post by BeyondTrust Research Team August 13, 2013
Tags:
,
Retina CS

Top 5 Tips and Tricks for Retina CS 4.5

I honestly believe we have the best pre-sales, post sales, and technical support departments in the security industry. They are responsive, technical, and can customize BeyondTrust solutions to match individual business requirements, even when they are pretty comprehensive outside-of-the-box. Based on their work, we have an internal process and external knowledge base to document these…

Post by Morey Haber August 8, 2013
Tags:
, , , , , , ,
GoogleAppsLogoTransparent

New Free Tool for the Security Community! PowerBroker Auditor for Google Apps

Today we announced our most recent free product offering for the security community – PowerBroker Auditor for Google Apps. Read the press release Download the product Check out a quick video on PowerBroker Auditor for Google Apps According to Google, Google Apps has over 5 million businesses worldwide. This adoption includes considerable traction in the…

Post by Mike Puterbaugh August 7, 2013
Tags:
, , , , ,
New-Audit-Review-screenshot

Did you know? Create custom audit views and reports with PowerBroker Auditor for Active Directory

Did you know about the create custom audit views and reports feature in the PowerBroker Auditor for Active Directory solution?  Even though there are already around 200 built-in audit views that ship with the product organizations need to be able to target specific information for their environment and the task that is at hand. Needless…

Post by Morgan Holm July 31, 2013
Tags:
, , , , , , , , , ,
pbps-full-list-pbps-manages-incl-systems-and-accounts

Top 10 Reasons You Need Privileged Account Management Now

Don’t under estimate the complexity organizations face with managing and sharing access to privileged accounts. BeyondTrust has a wide variety of solutions that address the various challenges of privileged accounts.  Here are 10 key reasons our customers need and value the PowerBroker Password Safe solution: 1. EVERYONE has trouble managing privileged passwords – While some…

Post by Paul Harper July 29, 2013
Tags:
, , , , , ,
certified-partner

New OPSWAT Certifications for BeyondTrust!

I know most of you out there think marketing is blinky pens, trade shows, and people who for the most part don’t know the first thing about the products they represent. I’d like to put those stereotypes to bed right now, as here at BeyondTrust we have NEVER had blinky pens…..we have flashing balls ;-)….

Post by Mike Yaffe July 23, 2013
Tags:
, , , ,

Controlling User Accounts and Regulatory Compliance

PCI DSS Requirement 8 requires that organizations must be able to identify and log all user and administrative access to information systems and applications containing credit card and personally identifiable information. In addition, environments must also have a unique ID for every individual that will have computer access to these systems.  This simple requirement can…

Post by Morey Haber July 15, 2013
Tags:
, , , , , , , , , , ,

July VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Post by Qui Cao July 15, 2013