BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘least privilege’

BI-5.1-user-asset-visibility-img

Understanding Who Has Access to What with BeyondInsight v5.1

Today, it’s my pleasure to introduce you to BeyondInsight version 5.1, the latest release of our IT Risk Management platform, which unifies several of our solutions for Privileged Account Management and Vulnerability Management. BeyondInsight v5.1 embodies BeyondTrust’s mission to give our customers the visibility they need to make smart decisions and reduce risk to their…

Post by Morey Haber April 15, 2014
Tags:
, , , , , , , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE

BeyondInsight: Privilege and Vulnerability Management Unification

Fifteen years ago there was a revolution in information technology operations. Different teams that managed networks and systems merged their practices and technology under frameworks like Computer Associates Unicenter and IBM Tivoli. Today, these solutions have evolved to CA Spectrum, SolarWinds, and SpiceWorks. These are all fantastic technologies that have proven that the fusion of…

Post by Morey Haber February 18, 2014
Tags:
, , , , , ,

Least Privilege on Windows Desktops and Servers

We have all seen the news. Least privilege attacks on the NSA and companies like Target have lead to elevated privileges on sensitive systems and access to confidential data. Securing administrative privileges on desktops and servers is beginning to take center stage for many organizations since low level entry points are now being used to…

Post by Morey Haber February 13, 2014
Tags:
, , , ,
BT_Privilege Gone Wild Infograpic v1

Privilege gone wild! Our latest survey finds privileged users are out of control.

Did you know that 40% of employees have unnecessary access rights? What about that over 25% of employees admitted to having retrieved information not relevant to their job like financial, reports, salary info, HR and personnel docs? Now have I caught your attention? As our latest security survey proves, insider threats continue to be a…

Post by Sarah Lieber October 22, 2013
Tags:
, , , , , , , , , ,
did you know

Did you know? Continuous Protection feature

Did you know that the continuous protection feature in the PowerBroker Management Suite is unique in the market?  You may have heard it referred to as continuous recovery or continuous backup. What is it? – It’s like the undo feature found in MS Word but for Active Directory (AD). PowerBroker Auditor for Active Directory provides…

Post by Morgan Holm August 21, 2013
Tags:
, , , ,
PowerBroker-Events-Img2

Control Access and Reduce Risk

In my last blog I discussed bringing the NOC and SOC closer together, providing IT Operations with tools that improve security. This week I’ll go into more specifics of the solution and show how PowerBroker for Windows is used by both IT Operations and Security Operations teams. The Challenge Supporting a security principle such as…

Post by Bill Virtue June 14, 2013
Tags:
, , , , , ,
NSA-breach

Think You’re Safe from Internal Threats? The NSA Breach Will Make You Think Twice.

When reading a recent article in the USA Today about how Edward Snowden, a former Booz Allen Hamilton employee and NSA contractor, was able to steal sensitive data via non-specific vectors, I was reminded of the illusion that threats are predominately external to organizations. Even though we might not know exactly how Snowden was able to…

Post by Rod Simmons June 13, 2013
Tags:
, , , , , , ,
IE-0day

Internet Explorer 8 0day

Last week, news broke that the U.S. Department of Labor’s (DoL) website was compromised… and that it had been serving up Internet Explorer 0day to its visitors. This 0day, CVE-2013-1347 (Retina Audit 19041 – Microsoft Internet Explorer 8 Remote Code Execution Vulnerability (Zero-Day)), only affects Internet Explorer 8 on Windows XP, Vista, and Windows 7 (as well as Server 2003,…

Post by BeyondTrust Research Team May 6, 2013
Tags:
, , , , , ,
Endpoint Solutions Families

Security Tools for IT

There is still a divide between the Security Operations Center (SOC) and the Network Operating Center (NOC). Security Operations is more strategic following security best practices to improve corporate security posture (based on business risk) and to ensure implementation of security policies and compliance. While IT is focused on network management, infrastructure availability and SLAs…

Post by Bill Virtue April 30, 2013
Tags:
, , , , ,
lucy2

Least Privilege and South Korea

No, this isn’t some editorial piece about the interrelationships of varying social strata in South Korean society and Gangnam Style. Despite how interesting that may be, we are instead taking a quick look at the latest “wiper” malware to strike fear in the hearts of CTOs and IT admins alike – DarkSeoul (or Jokra or…

Post by BeyondTrust Research Team March 26, 2013
Tags:
, , , ,