BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

retinacs-dashboard

Our Newest Product Release: Retina CS 4.5

We are very excited for our latest release of Retina CS 4.5. With this release, the Retina CS platform continues to extend our leadership in risk identification and prioritization. By integrating the PowerBroker product portfolio with Retina CS, our customers are able to combine vulnerability data with privileged identity and password management risk intelligence, which provides them with improved situational…

Post by Sarah Lieber June 13, 2013
Tags:
, , , , , , , , , ,

June 2013 Patch Tuesday

It’s halfway through the year and we are seeing the total bulletin count creep just past fifty. This month, Microsoft is providing patches for Internet Explorer, the Windows kernel (and kernel-mode drivers), Windows print spooler components, and Microsoft Office. There are five bulletins in total, comprised of 1 critical (Internet Explorer) bulletin and the remaining…

Post by BeyondTrust Research Team June 11, 2013
Tags:
, , , , , ,
PBW with RI

Our Newest Product Release: PowerBroker for Windows 6.0

We’re very excited to announce the release of PowerBroker for Windows 6.0, the industry’s first identity management solution able to leverage least privilege and vulnerability data scanned by the award winning Retina CS Threat Management Console. This allows our customers to take a system’s overall risk into context when deciding what level of privileges a user or…

Post by Sarah Lieber June 5, 2013
Tags:
, , , , , , , , , ,
RPA-screenshot

Advanced Architectures with the Retina Protection Agent

One of the extended features of Retina CS is the Retina Protection Agent. This component is licensed with Retina and allows for users to assess hosts for vulnerabilities using a local scanning agent verses a network scan. This forgoes the need of a traditional SaaS or on-premise vulnerability assessment solution to perform a scan outside…

Post by Morey Haber May 31, 2013
Tags:
, , , ,
retinacs-dashboard

PowerBroker for Windows Policy Through Retina CS Web Services

PowerBroker for Windows has traditionally relied on Active Directory Group Policy to populate assets with the latest rules and policies. The technology also contains a utility for managing off-line systems called PBDeploy and has met the challenges for many organizations when a domain is not available for authentication. With the growing number of portable Windows…

Post by Morey Haber May 29, 2013
Tags:
, , , , ,
native-tool-integration

Did you know? – Native tool integration

Did you know about the native tool integration feature in the PowerBroker Management Suite?  PowerBroker solution functionality is available through the native Microsoft administration tools referred to as Remote Server Administration Tools (RSAT).  These are the tools that administrators use on a day to day basis to manage their environment. What is it? – It’s…

Post by Morgan Holm May 29, 2013
Tags:
, , ,
guy-stress-m

Do you want to do this the “hard” way?

Too often I see people working on what they can fix, what is easy. It’s like when I exercise, if I see progress I keep working at it but the problem areas (there are a lot of them) can wait until tomorrow. Over the past several years I see organizations doing a better job with…

Post by Mike Yaffe May 28, 2013
Tags:
, , , , ,
PIM-DefaultCricklewood

The Integrity of Files and Privileged Identity Management

The concept of privilege identity management allows for the elevation of applications and operating system functions to authoritative users based on rules and policies. While the basic context of the user does not have permissions to perform these tasks, the rules and policies in place provide a vehicle for them to operate in a privileged…

Post by Morey Haber May 27, 2013
Tags:
, , , , ,
PBW-session-viewer

Session Monitoring Provides Context Aware Security for Windows

The Windows world is about to get a long overdue lesson from Unix. Privilege Identity Management does not stop at just logging that an application gets launched with elevated privileges; administrators need to know what the user does with that application, as well. Did they use the program within the guidelines of company policy or…

Post by Morey Haber May 23, 2013
Tags:
, , , , ,

May VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Post by Qui Cao May 21, 2013