BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘information security’

August VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Post by Qui Cao August 19, 2013
Tags:
, , , , , , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
penny

5 steps to securing the small business (that don’t cost a penny)

For many small businesses there are considerable restraints on both budget and personnel that can make implementing a good security practice feel like an insurmountable challenge. Recent news gives us a constant reminder of the threats we all face from hactivists, electronic espionage, and good old fashioned script kiddies out to cause damage. These threats…

Post by Andy Clark May 1, 2013
Tags:
, , , , , , , , ,
Endpoint Solutions Families

Security Tools for IT

There is still a divide between the Security Operations Center (SOC) and the Network Operating Center (NOC). Security Operations is more strategic following security best practices to improve corporate security posture (based on business risk) and to ensure implementation of security policies and compliance. While IT is focused on network management, infrastructure availability and SLAs…

Post by Bill Virtue April 30, 2013
Tags:
, , , , ,
security-people

It’s not about the security, it’s about the people

I’ve said it before and I’ll say it again, I’m a big fan of the Doctor Who series. I was watching a recent episode where they needed to hack into a computer system. The Doctor didn’t think Clara, the current leading lady, could do it because the security was too tight. She replied simply, “It’s…

Post by Jason Silva April 25, 2013
Tags:
, , , , , , , , ,
cnbc-uk-video-maiffret

CNBC Interview Featuring our CTO: Security Takes a Backseat in Tech

Marc Maiffret, our CTO, was interviewed earlier today in the UK on CNBC. He tells CNBC most aspects of society are being built around technology and most companies aren’t building technology with security in mind. In the interview, Marc states: “Most aspects of society today are being built around technology from every facet. If you…

Post by Sarah Lieber April 22, 2013
Tags:
, , , , , ,
chalk cliff in england-resized-600.jpg

Privilege Identity Management – A Help Desk Perspective

Help desk technicians within a company are the first line of defensive for a new project or system problem. Most of the time, they are informed and trained that users will be getting a new piece of security software. The solution, in this case, is called Privileged Identity Management (PIM) and is designed to manage authenticated permissions…

Post by Morey Haber October 12, 2012
Tags:
, , , , , , ,
rsa-archer-egrc-2-680x393

Now Available! Direct Integration from Retina CS into RSA Archer eGRC

Yet another first for BeyondTrust and eEye Digital Security. Our combined companies are proud to release our first new direct integration from Retina CS into RSA Archer eGRC. The business value provides comprehensive vulnerability management data directly into Archer’s Threat Management system. Using direct database access from Archer’s Integration System, the eGRC platform harvests asset…

Post by Morey Haber June 1, 2012
Tags:
, , , , , ,
Chrome-No.-1-Browser-98x98

Chrome continues its march to security domination. We nod knowingly.

As security researchers, we’re always looking for ways to put the security conversation in the spotlight; be it an interesting fact, figure or editorial. By now you’ve probably read about how Google Chrome has achieved the number one browser position, worldwide (according to StatCounter). Coming in at about 32.76% of the global browser market share,…

Post by The eEye Research Team May 22, 2012
Tags:
, , , , , , ,