BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Big Data? Is There Any Bigger Data Than Your Security Data?

Posted November 22, 2011    Morey Haber

The idea of “big data” has technology vendors and customers alike scrambling to come up with ways to manage the limitless amounts of data being generated by apps, API’s, databases, web services, etc.

For organizations with aggressive security and compliance requirements, the security data driving today’s modern threat and risk intelligence (assessments, compliance reports, attack and mitigation data, etc.) is ‘big data’ in itself. In fact, it might be the biggest data in your organization, with regards to its value and impact to operations.

It is one thing to collect this data (no small feat, actually), but the real challenge is in making sense of all of this valuable information in an actionable format.

How can you get beyond simply managing this data and actually using it to make informed decisions about how to best protect your business? We’re glad you asked. Retina Insight is a comprehensive security data warehouse which our customers use to store and report on threat and risk data, which helps them satisfy both internal and external compliance requirements more accurately and efficiently. In short, we help put your security in context.

Want to learn more? Turn off email, put your phone on DND and check out the video below. Morey and Robert, our eEye product experts, will show you how powerful this capability is and why it should be part of every vulnerability management deployment.

Tags:

Additional articles

powerbroker-for-mac-diagram-small

PowerBroker for Mac: A Least-Privileged Apple a Day…

Posted July 27, 2015    Jason Silva

BeyondTrust PowerBroker for Mac reduces the risk of privilege misuse by enabling standard users on Mac OS X to perform administrative tasks successfully without entering elevated credentials.

Tags:
, ,
PrivilegedAccountManagement

On Demand Webinar – Now is the time for Privileged Account Management

Posted July 24, 2015    BeyondTrust Software

In this webinar, SANS Instructor and Founder of Voodoo Security, Dave Shackleford, will revisit several hacking and breach scenarios that involved privileged accounts, and use these as examples while discussing tools and tactics to get this problem under control once and for all.

Tags:
, ,
dave-shackleford-headshot

Privileged Account Management: The Time is Now

Posted July 22, 2015    Dave Shackleford

There’s plenty of problems we don’t have great options for in InfoSec today. Malware is a pain point that keeps evolving rapidly. 0-day exploits are tough to prepare for. Privileged account management? We got this. We know the root causes, we know how it manifests, we know how to get it under control effectively, and there are great technology solutions that are enterprise-class.

Tags:
, ,