BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘BeyondTrust’

patch-tuesday

October 2014 Patch Tuesday

Posted October 14, 2014    BeyondTrust Research Team

This October Microsoft has released eight security bulletins that cover a variety of Windows technologies from client-application attacks that would be useful in drive-by web attacks to privilege escalation vulnerabilities useful as second stage payloads to elevate from a standard user to having increased Administrator privileges. We recommend patching MS14-056 (Internet Explorer) first and then…

Tags:
, , ,
pbps-blog3

7 Reasons Customers Switch to Password Safe for Privileged Password Management

Posted September 24, 2014    Chris Burd

It’s clear that privileged password management tools are essential for keeping mission-critical data, servers and assets safe and secure. However, as I discussed in my previous post, there are several pitfalls to look out for when deploying a privileged password management solution. At this point, you may be wondering how BeyondTrust stacks up. With that,…

Tags:
, , , , , ,
pbps-blog2

8 Reasons Your Privileged Password Management Solution Will Fail

Posted September 18, 2014    Chris Burd

Leveraging complex, frequently updated passwords is a basic security best practice for protecting privileged accounts in your organization. But if passwords are such a no-brainer, why do two out of three data breaches tie back to poor password management? The fact is that not all privileged password management strategies are created equal, so it’s critical…

Tags:
, , , , , , ,
patch-tuesday

September 2014 Patch Tuesday

Posted September 9, 2014    BeyondTrust Research Team

This September Microsoft has released four security bulletins that cover a good level of Windows based attack surface. The two vulnerabilities that you should look to patch most immediately are MS14-052 (Internet Explorer) and MS14-054 (Windows Task Scheduler). Rounding things out you should get MS14-053 (.NET) done followed by MS14-055 (Lync) if applicable to your…

Tags:
, , ,
veritas-logo

BeyondTrust to be acquired by Veritas Capital

Posted September 2, 2014    Mike Yaffe

We’re pleased to announce that Veritas Capital plans to acquire BeyondTrust. This is positive news for everyone associated with BeyondTrust, as it will spur significant investments in our Privileged Account Management and Vulnerability Management solutions. Rest assured that the BeyondTrust management team will remain intact, and there will be no changes to the company name,…

Tags:
, ,
RCS-Mobile-Blog-IMG

Identifying Android Phone Vulnerabilities that Threaten Your Corporate Network

Posted May 20, 2014    Morey Haber

According to a recent McKinsey survey, more than 80% of employees now use personal smartphones for work-related purposes. Vulnerable smartphones can spread malware to business infrastructure via emailed attachments and to corporate networks through bots. Assessing mobile devices for vulnerabilities that could lead to infections and data manipulation is therefore a real concern for data…

Tags:
, , , , , , , ,

Comparing Active Directory Auditing Solutions? Here are 7 Things You Can’t Afford to Overlook

Posted May 15, 2014    Gail Ferreira

If you’re responsible for your organization’s Active Directory environment, you probably know how time-consuming it can be to audit and recover AD changes. Maybe there was a particular incident where manually tracking down an errant change and putting things back in order involved too much blood, sweat and tears – or maybe you’ve simply spent…

Tags:
, , , , , , ,
oracle-software-delivery-cloud

Accelerate and Simplify Deployment of PowerBroker Privilege Management Solutions with Oracle VM Templates

Posted May 1, 2014    Chris Burd

On April 17th, Oracle and BeyondTrust experts Doan Nguyen and Paul Harper shared how leveraging Oracle VM Templates can automate and simplify the deployment of the PowerBroker for UNIX & Linux privilege management solution across your IT environment. See below for an embedded, on-demand recording of the webcast. Oracle and BeyondTrust Team Up The partnership…

Tags:
, , , , , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Posted April 17, 2014    Chris Burd

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Tags:
, , , , ,

Evolving Privileged Account Management for Maximum Operational Efficiency

Posted April 2, 2014    Gail Ferreira

We all want to make our lives easier, but how much privilege management is enough? At BeyondTrust, we see more and more organizations looking to simplify the tool sets used to manage their internal security and compliance environments. Historically, many organizations purchased privilege management solutions to address specific audit findings or challenges in isolation. This…

Tags:
, , , , ,