BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Statistics, Claims, Marketing and Leadership in IT Risk Management

Posted June 12, 2014    Morey Haber

Good marketing plans and effective technology can place unmovable stakes in the ground in terms of statistics and claims. You see these every day in the form of ROI calculations, customer results, performance figures … the list goes on. The intention, to put it bluntly, is to point out differentiators that help customers select one vendor’s solution over those of competitors.

You might find it odd that I’m talking about this on a blog, but understanding how and why a company chooses to market a solution is just as important as the claims they make. For example, an automobile manufacturer may make claims around safety or awards but not reference whether any of their competitors are as safe or received the same awards. They want you to only think of their brand, their strategy, and what they can do for you. You end up thinking the car is safe.

Software solutions are not much different. BeyondTrust has an integrated suite of solutions that share and report on common data through the centralized BeyondInsight management interface. BeyondInsight essentially links data to reveal the risks and threats within an organization. This data comes from our best-of-breed PowerBroker Privileged Account Management (PAM) and Retina Vulnerability Management (VM) solutions. PowerBroker and Retina solutions can be used separately or integrated together – it’s totally up to each customer. Now for our claims:

  • Multiple patents pending on many best-of-breed BeyondTrust solutions
  • Discovery detection for over 2,500 different operating systems and devices
  • Vulnerability scanning of a Class C network with authentication in under 25 minutes
  • Over 260 reports shipped out-of-the-box and a true ad-hoc report creator
  • The only solution to have Vulnerability-Based Application Management for application control
  • The only solution to have patent pending integrated technology for privilege management, privileged password management, and vulnerability management in the same console
  • Industry-unique cloud, mobile and data import connectors for complete zero-gap coverage
  • The only technology to ship with a structured big data warehouse for statistical analysis of all datasets

Of course, there are plenty more differentiators that we bring to the table. While other technologies have stayed completely vertical, BeyondTrust has taken the lead in recognizing that dissimilar datasets, when probably merged together, can provide an eye-opening experience for security and operations teams alike. If you look at other successful software companies, they dared to move out of their single products and expand into technologies that made relevant sense: Microsoft with operating systems and office applications; Apple with computers, music players, smartphones and tablets; BeyondTrust with risk management solutions that address internal, user-based risks as well as external threats to IT assets. Bold, I know.

But it just makes sense. You need to understand how users are interacting with systems, what permissions they have, and what security risks are present on those systems. Operations and security teams have to work hand-in-hand to solve a common problem. Not too many technologies bring different teams within an organization together and allow them to share the same data for solving a problem. Consider all of these users:

users-graphic-0614

Each one can get data and analysis in the formats they need, such as executive reports, SLA reports, and even heat maps. If you sit different users around the table, the reports they view all have the same data – but that data is properly pivoted to their individual roles. Auditors get a regulatory perspective, operations gets a patch report, and security teams a risk report – all based on the same data. No other vendor does this. This takes the concept of Context-Aware Security Intelligence to the next level and helps tie technology (with all the claims) to strategy.

At BeyondTrust, we back our claims with proven, best-of-breed solutions that are powerful in their own rights – and can combine to provide a new level of visibility into risk throughout your organization. Whether you need to implement Least Privilege, increase the security of user accounts, eliminate vulnerabilities, or all of the above, we can help.

> Learn more about our Privileged Account Management and Vulnerability Management solutions
> Read the white paper: “Fusing Vulnerability Data and Actionable User Intelligence”

Tags:
, , , , , ,

Leave a Reply

Additional articles

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Posted July 24, 2014    Morey Haber

There is a reason all BeyondTrust Privileged Account Management (PAM) solutions share the PowerBroker name: They all inherently enable you to reduce user-based risk and can be integrated under a centralized IT risk management platform. Here’s one common use case that demonstrates how this integration changes the playing field. Consider the challenge of privileged access:…

Tags:
, , , , ,
PowerBroker Password Safe Password Age Report

Reshaping Privileged Password Management with Password Safe 5.2

Posted July 21, 2014    Martin Cannard

Today, we’re pleased to unveil the latest edition of our privileged password management solution, PowerBroker Password Safe. I’ll start with a brief intro of what’s new and then tell you a little about the driving factors behind Password Safe development. New features for mitigating password risk and ensuring accountability enterprise-wide Here’s the 10,000-foot overview of…

Tags:
, , ,
PowerBroker for Windows tamper protection

PowerBroker for Windows 6.6 Tamper Protection

Posted July 18, 2014    Morey Haber

I have a bone to pick: Stopping an administrator from performing an action on a system is futile endeavor. As an administrator, there is always a way to circumvent a solution’s from tampered protection. Really! By default, Windows administrators have unrestricted access to the system – and even though an application, hardened configuration, or group policy…

Tags:
, ,