BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Statistics, Claims, Marketing and Leadership in IT Risk Management

Posted June 12, 2014    Morey Haber

Good marketing plans and effective technology can place unmovable stakes in the ground in terms of statistics and claims. You see these every day in the form of ROI calculations, customer results, performance figures … the list goes on. The intention, to put it bluntly, is to point out differentiators that help customers select one vendor’s solution over those of competitors.

You might find it odd that I’m talking about this on a blog, but understanding how and why a company chooses to market a solution is just as important as the claims they make. For example, an automobile manufacturer may make claims around safety or awards but not reference whether any of their competitors are as safe or received the same awards. They want you to only think of their brand, their strategy, and what they can do for you. You end up thinking the car is safe.

Software solutions are not much different. BeyondTrust has an integrated suite of solutions that share and report on common data through the centralized BeyondInsight management interface. BeyondInsight essentially links data to reveal the risks and threats within an organization. This data comes from our best-of-breed PowerBroker Privileged Account Management (PAM) and Retina Vulnerability Management (VM) solutions. PowerBroker and Retina solutions can be used separately or integrated together – it’s totally up to each customer. Now for our claims:

  • Multiple patents pending on many best-of-breed BeyondTrust solutions
  • Discovery detection for over 2,500 different operating systems and devices
  • Vulnerability scanning of a Class C network with authentication in under 25 minutes
  • Over 260 reports shipped out-of-the-box and a true ad-hoc report creator
  • The only solution to have Vulnerability-Based Application Management for application control
  • The only solution to have patent pending integrated technology for privilege management, privileged password management, and vulnerability management in the same console
  • Industry-unique cloud, mobile and data import connectors for complete zero-gap coverage
  • The only technology to ship with a structured big data warehouse for statistical analysis of all datasets

Of course, there are plenty more differentiators that we bring to the table. While other technologies have stayed completely vertical, BeyondTrust has taken the lead in recognizing that dissimilar datasets, when probably merged together, can provide an eye-opening experience for security and operations teams alike. If you look at other successful software companies, they dared to move out of their single products and expand into technologies that made relevant sense: Microsoft with operating systems and office applications; Apple with computers, music players, smartphones and tablets; BeyondTrust with risk management solutions that address internal, user-based risks as well as external threats to IT assets. Bold, I know.

But it just makes sense. You need to understand how users are interacting with systems, what permissions they have, and what security risks are present on those systems. Operations and security teams have to work hand-in-hand to solve a common problem. Not too many technologies bring different teams within an organization together and allow them to share the same data for solving a problem. Consider all of these users:

users-graphic-0614

Each one can get data and analysis in the formats they need, such as executive reports, SLA reports, and even heat maps. If you sit different users around the table, the reports they view all have the same data – but that data is properly pivoted to their individual roles. Auditors get a regulatory perspective, operations gets a patch report, and security teams a risk report – all based on the same data. No other vendor does this. This takes the concept of Context-Aware Security Intelligence to the next level and helps tie technology (with all the claims) to strategy.

At BeyondTrust, we back our claims with proven, best-of-breed solutions that are powerful in their own rights – and can combine to provide a new level of visibility into risk throughout your organization. Whether you need to implement Least Privilege, increase the security of user accounts, eliminate vulnerabilities, or all of the above, we can help.

> Learn more about our Privileged Account Management and Vulnerability Management solutions
> Read the white paper: “Fusing Vulnerability Data and Actionable User Intelligence”

Tags:
, , , , , ,

Leave a Reply

Additional articles

Sudo_logo

Don’t Create a Different sudoers File for Each System

Posted May 20, 2015    Randy Franklin Smith

What if you have multiple Linux and/or Unix systems? Sudo management can become onerous and unwieldy if you try to manage a different sudoers file on each system. The good news is that sudo supports multiple systems.

password-safety

What Does Microsoft Local Administrator Password Solution Really Do?

Posted May 19, 2015    Morey Haber

LAPS is a feature that allows the randomization of local administrator accounts across the domain. Although it would seem that this capability overlaps with features in BeyondTrust’s PowerBroker Password Safe (PBPS), the reality is it is more suited for simple use cases such as changing the local Windows admin account and not much more.

Tags:
, ,
webinar_ondemand

On Demand Webinar: Securing Windows Server with Security Compliance Manager

Posted May 14, 2015    BeyondTrust Software

On Demand Webinar: Security Expert Russell Smith, explains how to use Microsoft’s free Security Compliance Manager (SCM) tool to create and deploy your own security baselines, including user and computer authentication settings.

Tags:
, ,