BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

RIP Section 179 Benefits on December 31, 2010

Posted November 23, 2010    Peter McCalister

The Economic Stimulus Act of 2008, which was extended to 2009 and 2010, is now coming to an end this year and the associated benefits with Section 179 will also be lost to businesses.  Section 179 of the IRS tax code encourages businesses to buy equipment/software and invest in themselves to help spur our economy.

Section 179 allows companies to write off the entire purchase price for qualifying software in the year of purchase (up to $500,000 for the first year) instead of forcing companies to depreciate that purchase over five years.  So, organizations looking to benefit from this provision to implement a “least privilege” solution must complete the purchase of a privilege identity management solution before December 31, 2010.  A countdown clock, as well as a comprehensive description of the logistics, impact and business scenarios, can be found atSection179.org.

Eligible software cannot be “custom code” and in general needs to be commercially available “off the shelf” and, according to Section179.org, the guidelines in order to be eligible for this deduction include:

  1. “The software must be purchased outright or financed (only specific leases or loans qualify) by the company taking the deduction.
  2. The software must be used by the business.
  3. The software must have a determinable useful life
  4. The software must be expected to last more than one year.”

If you are thinking of eliminating admin rights from your organization then start your research here now.

Leave a Reply

Additional articles

{c4eae211-3ca2-4f8e-b2b9-6df0e970aab1}_g.markhardy

The “insider” threat. Is it real, or is it being blown out of proportion?

Posted March 4, 2015    G. Mark Hardy

A lot depends on whether or not you’ve been compromised. And therein lies the problem. Cyber threats are often ignored until they cause some damage, at which point management looks for people to blame and gives all kinds of attention to fixing the problem – until the next crisis in accounting or warehousing or staffing comes along.

Tags:
, , ,
webinar_chalk

Webinar March 4th: Recreating the Carbanak Breach & Techniques for Mitigating Similar Attacks

Posted March 3, 2015    Lindsay Marsh

Join BeyondTrust Research and Development team for an in-depth live webinar that will explore the attack vectors used in the Carbanak Bank Breach and share successful mitigation techniques needed to prevent this type of attack.

Tags:
, ,
VMware Hardening Guidelines-img3

How to Audit VMware ESX and ESXi Servers Against the VMware Hardening Guidelines with Retina CS

Posted February 27, 2015    BeyondTrust Research Team

Retina CS Enterprise Vulnerability Management has included advanced VMware auditing capabilities for some time, including virtual machine discovery and scanning through a cloud connection, plus the ability to scan ESX and ESXi hosts using SSH. However, in response to recent security concerns associated with SSH, VMware has disabled SSH by default in its more recent…

Tags:
, , , ,