BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘Configuration Compliance’

gear6-98x98

Configuration Mistakes Make for Costly Security Gaps

Earlier this week, Brian Prince over at Security Week posted an article on a subject that we’ve always been passionate about here at eEye, now BeyondTrust, Research – and that’s configuration.  More specifically, the incredible impact that smart, effective configuration can have on reducing attack surface for any size organization.

Post by Daniel Jacobowitz May 25, 2012
Tags:
, , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
sticky

Automating Configuration Auditing

????????I want to discuss a rather simple use case with my readers that until recently, had a rather complex solution. Consider you are a major airline, corporation, or even a local government with thousands of systems that should be identical from a configuration perspective. These could be airline check-in kiosks, a call center handling support calls,…

Post by Morey Haber March 15, 2011
Tags:
, , , , , , , , ,

Too Many Regulatory Standards, Only One Tool Please

About every two years, I indulge myself with a new laptop. This time, I waited almost three years and will be retiring my old Dell XPS M1330 for a new Alienware M15x. I wanted raw horsepower for virtual machines in a laptop format and was not as concerned about battery life (since I carry an…

Post by Morey Haber November 12, 2010
Tags:
, , , , , , , , , , , , , , , , ,