BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘Endpoint Protection’

PBW with RI

Our Newest Product Release: PowerBroker for Windows 6.0

We’re very excited to announce the release of PowerBroker for Windows 6.0, the industry’s first identity management solution able to leverage least privilege and vulnerability data scanned by the award winning Retina CS Threat Management Console. This allows our customers to take a system’s overall risk into context when deciding what level of privileges a user or…

Post by Sarah Lieber June 5, 2013
Tags:
, , , , , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
IE-0day

Internet Explorer 8 0day

Last week, news broke that the U.S. Department of Labor’s (DoL) website was compromised… and that it had been serving up Internet Explorer 0day to its visitors. This 0day, CVE-2013-1347 (Retina Audit 19041 – Microsoft Internet Explorer 8 Remote Code Execution Vulnerability (Zero-Day)), only affects Internet Explorer 8 on Windows XP, Vista, and Windows 7 (as well as Server 2003,…

Post by BeyondTrust Research Team May 6, 2013
Tags:
, , , , , ,
Hiding in plain sight

IT Security’s Best Kept Secret – Hiding in Plain Sight

This blog post was first posted on Wired.com on January 22nd, 2013. It can be found, in it’s original formatting, here: http://insights.wired.com/profiles/blogs/it-security-s-best-kept-secret-hiding-in-plain-sight               There’s a reason the old saying “an ounce of prevention is worth of a pound a cure” resonates in so many situations – because it’s true….

Post by Mike Puterbaugh January 22, 2013
Tags:
, , , , , ,
Blink6.0

Just Released Blink 6.0: Advanced Endpoint Protection

It has been a long time since any vendor has introduced game changing features to end point protection solutions. We have seen claims of better anti-virus protection, advanced persistent threat protection (APT), and even claims of massive resource savings using their latest versions. BeyondTrust believes in a defense in depth approach to end point protection…

Post by Morey Haber August 16, 2012
Tags:
, , , , ,

The Value of a Zero-Day Vulnerability Assessment Scanner

Let’s assume your business is near perfect. You have a proven and reliable vulnerability management lifecycle in place and identification of vulnerabilities and patch remediation happens like clockwork. Finding lingering threats or missing patches is a rarity and even your endpoint protection solution never fails catching the latest malware. Like I said, a near perfect…

Post by Morey Haber October 26, 2010
Tags:
, , , , , ,

The Retina Protection Agent

Traditional anti-virus solutions that rely on blacklisting malware are insufficient to protect today’s systems from the plethora of threats. Security vendors have evolved endpoint protection solutions to include firewalls, host-based intrusion prevention solutions, and even proactive application protection capabilities in order to defend against the evolving threat landscape. Unfortunately, many businesses still rely on anti-virus…

Post by Morey Haber September 2, 2010
Tags:
, , , , , , , , , ,