BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Statistics, Claims, Marketing and Leadership in IT Risk Management

Posted June 12, 2014    Morey Haber

Good marketing plans and effective technology can place unmovable stakes in the ground in terms of statistics and claims. You see these every day in the form of ROI calculations, customer results, performance figures … the list goes on. The intention, to put it bluntly, is to point out differentiators that help customers select one vendor’s solution over those of competitors.

You might find it odd that I’m talking about this on a blog, but understanding how and why a company chooses to market a solution is just as important as the claims they make. For example, an automobile manufacturer may make claims around safety or awards but not reference whether any of their competitors are as safe or received the same awards. They want you to only think of their brand, their strategy, and what they can do for you. You end up thinking the car is safe.

Software solutions are not much different. BeyondTrust has an integrated suite of solutions that share and report on common data through the centralized BeyondInsight management interface. BeyondInsight essentially links data to reveal the risks and threats within an organization. This data comes from our best-of-breed PowerBroker Privileged Account Management (PAM) and Retina Vulnerability Management (VM) solutions. PowerBroker and Retina solutions can be used separately or integrated together – it’s totally up to each customer. Now for our claims:

  • Multiple patents pending on many best-of-breed BeyondTrust solutions
  • Discovery detection for over 2,500 different operating systems and devices
  • Vulnerability scanning of a Class C network with authentication in under 25 minutes
  • Over 260 reports shipped out-of-the-box and a true ad-hoc report creator
  • The only solution to have Vulnerability-Based Application Management for application control
  • The only solution to have patent pending integrated technology for privilege management, privileged password management, and vulnerability management in the same console
  • Industry-unique cloud, mobile and data import connectors for complete zero-gap coverage
  • The only technology to ship with a structured big data warehouse for statistical analysis of all datasets

Of course, there are plenty more differentiators that we bring to the table. While other technologies have stayed completely vertical, BeyondTrust has taken the lead in recognizing that dissimilar datasets, when probably merged together, can provide an eye-opening experience for security and operations teams alike. If you look at other successful software companies, they dared to move out of their single products and expand into technologies that made relevant sense: Microsoft with operating systems and office applications; Apple with computers, music players, smartphones and tablets; BeyondTrust with risk management solutions that address internal, user-based risks as well as external threats to IT assets. Bold, I know.

But it just makes sense. You need to understand how users are interacting with systems, what permissions they have, and what security risks are present on those systems. Operations and security teams have to work hand-in-hand to solve a common problem. Not too many technologies bring different teams within an organization together and allow them to share the same data for solving a problem. Consider all of these users:

users-graphic-0614

Each one can get data and analysis in the formats they need, such as executive reports, SLA reports, and even heat maps. If you sit different users around the table, the reports they view all have the same data – but that data is properly pivoted to their individual roles. Auditors get a regulatory perspective, operations gets a patch report, and security teams a risk report – all based on the same data. No other vendor does this. This takes the concept of Context-Aware Security Intelligence to the next level and helps tie technology (with all the claims) to strategy.

At BeyondTrust, we back our claims with proven, best-of-breed solutions that are powerful in their own rights – and can combine to provide a new level of visibility into risk throughout your organization. Whether you need to implement Least Privilege, increase the security of user accounts, eliminate vulnerabilities, or all of the above, we can help.

> Learn more about our Privileged Account Management and Vulnerability Management solutions
> Read the white paper: “Fusing Vulnerability Data and Actionable User Intelligence”

Tags:
, , , , , ,

Leave a Reply

Additional articles

webinar1

On Demand Webinar: Advanced Windows Tracing

Posted April 17, 2015    BeyondTrust Software

Webinar: Security MVP, Paula Januszkiewicz, shows Windows administrators how to be more aware of what happens whenever somebody does something within the system.

Tags:
, ,
5

The Delicate Art of Remote Checks – A Glance Into MS15-034

Posted April 15, 2015    Bill Finlayson

Remote vulnerability detection – using ms15-034 as an example.

Tags:
, ,
databreach

2015 Verizon Data Breach Investigations Report: More End Users as Threats

Posted April 15, 2015    Scott Lang

The 2015 Verizon report says end users are the number one source of insider abuse incidents. Find out how to mitigate the risks.

Tags:
,