BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘BeyondTrust’

bt-bb-acq

Media Coverage Roundup | BeyondTrust Acquires Blackbird Group

Posted December 12, 2012    Sarah Lieber

Today we announced the acquisition of Blackbird Group, a leader in Windows system management. With this addition, BeyondTrust furthers our vision to simplify IT security operations management, while providing customers much-needed context to improve decision-making to protect against both internal and external security threats. We’re happy to welcome the Blackbird Group! Read the official announcement now….

Tags:
, , , , , , , ,
12DaysofChristmas

12 Days of Giveaways Starts Now! Join Our 12 Twitter Days of Christmas!

Posted December 6, 2012    Qui Cao

Say hello to holiday fun and frolic! Starting TODAY, we’re running our 2nd Annual 12 Twitter Days of Christmas campaign! It’s time to celebrate the season of magic and what a better way to do so than with 12 days of giveaways from BeyondTrust? How to Participate in BeyondTrust’s 12 Twitter Days of Christmas: Here’s…

Tags:
, , , ,
bmc-img5

Retina CS 4.0 and Remedy Ticketing Integration

Posted November 29, 2012    Jerome Diggs

Overview Retina CS enables teams to centrally manage organization-wide IT security and compliance initiatives from a single, web-based console. It provides discovery, prioritization, and remediation of security risks by delivering what matters the most – context. Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the…

Tags:
, , , , , ,
sccminteg-img2

Microsoft SCCM Integration with Retina CS Threat Management Console

Posted November 28, 2012    Jerome Diggs

Overview Retina CS enables teams to centrally manage organization-wide IT security and compliance initiatives from a single, web-based console. It provides discovery, prioritization, and remediation of security risks by delivering what matters the most – context. Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the…

Tags:
, , , , , , ,
img

Don’t say “Lockdown”!

Posted October 15, 2012    Peter McCalister

Here at BeyondTrust, we have been fortunate to be able to speak with thousands of security professionals in dozens of industries, and it is astonishing how differently organizations assess risk and approach computer security. Some organizations are very strict about security and are able to completely lock down desktops. Others are significantly more lax about…

Tags:
, ,
bestknownsecret-2

PowerBroker for Windows, Best Known Secrets – Collections

Posted October 1, 2012    Morey Haber

One of the best-known secrets about PowerBroker for Windows is the ability to logically group rules into Collections. This Best Practice allows you to organize rules based on almost any criteria and treat multiple rules as a single entity. This feature is most useful when: Rules require the same item-level targeting Organizing rules into physical…

Tags:
, , , , ,
weakcertificates-retina

Retina Helps Identify Weak Certificates

Posted September 25, 2012    Jerome Diggs

Microsoft has released a Security Advisory for the upcoming patch to increase minimum bit levels of certificates to 1024 bit security advisory 2661254.  The expected release date for this patch is Oct 9th at which time the update will be available through Windows Update. This change to the minimum bits level of certificates will change…

Tags:
, , , , ,
android4_skate

How important is Android 4 to BYOD?

Posted September 19, 2012    Scott Ellis

Android 4 (so far dubbed Ice Cream Sandwich for 4.0.x or Jelly Bean for 4.1.x) is a significant upgrade to the user experience adding in many refinement and features.  For enterprises dealing with the Bring Your Own Device (BYOD) movement, some of these upgrades can be a double-edged sword.

Tags:
, , , , , , ,
scanner-ui

Xen Server Escape Exploit News

Posted September 10, 2012    Jerome Diggs

In today’s ever expanding virtualized data center it’s critical to ensure hypervisors/host systems are properly secured and patched to prevent bleed over into often dense populations of the corporate infrastructure.  According to a recent blog post on Threatpost, French research firm VUPEN security has revealed exploit code that takes advantage of a vulnerability in Xen…

Tags:
, , , , , , , , , , , ,
img13

4 Tips to Identify, Patch & Report on the Oracle Java Vulnerability

Posted September 7, 2012    Jerome Diggs

Last week our security research team provided some very enlightening information on a nasty Oracle Java vulnerability that until recently was a zero-day.  Oracle provided a patch for the vulnerability found in advisory (CVE-2012-4681)  and as a follow-up to the blog post by our security research team we wanted to share with you some easy…

Tags:
, , , , ,