BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘linux’

gettingleastprivright-manandkey

Getting Least Privilege Right on Windows

Posted June 30, 2014    Morey Haber

Windows doesn’t make least privilege easy Enforcing least-privilege access policies on Windows has never been easy – especially given some fundamental flaws have haunted the OS since the mid-1990s. Consider the following permissions issues: Windows 95 and 98 had a logon screen and could even be joined to the domain, but users could bypass the prompt…

Tags:
, , , , , , ,
oracle-software-delivery-cloud

Accelerate and Simplify Deployment of PowerBroker Privilege Management Solutions with Oracle VM Templates

Posted May 1, 2014    Chris Burd

On April 17th, Oracle and BeyondTrust experts Doan Nguyen and Paul Harper shared how leveraging Oracle VM Templates can automate and simplify the deployment of the PowerBroker for UNIX & Linux privilege management solution across your IT environment. See below for an embedded, on-demand recording of the webcast. Oracle and BeyondTrust Team Up The partnership…

Tags:
, , , , , ,

PowerBroker for Unix & Linux Now Available via Web Services

Posted April 10, 2014    Paul Harper

This week BeyondTrust released a fully functional Web Services interface (REST API) for its PowerBroker for Unix & Linux product.  With this new feature users of the solution will now be able to remotely and securely configure and retrieve data via the API.  The Web Services interface implemented by BeyondTrust is an industry standard that…

Tags:
, , , , ,
5things-oraclebtwebinar-screenshot

The 5 Things Every Linux Administrator Should (and Should Not) Do When It Comes to Privileged Account Management

Posted February 3, 2014    Sarah Lieber

When it comes to privileged account management the list of things an administrator can do to protect their environment is seemingly never ending. Last week we hosted a webinar with Oracle Linux and presented a list of 5 things every Linux administrator should, and should not, do when managing privileged accounts. Given the current security…

Tags:
, , , , ,
BT_Privilege Gone Wild Infograpic v1

Privilege gone wild! Our latest survey finds privileged users are out of control.

Posted October 22, 2013    Sarah Lieber

Did you know that 40% of employees have unnecessary access rights? What about that over 25% of employees admitted to having retrieved information not relevant to their job like financial, reports, salary info, HR and personnel docs? Now have I caught your attention? As our latest security survey proves, insider threats continue to be a…

Tags:
, , , , , , , , , ,
PBIS-operations-dashboard

Our Newest Product Release: PowerBroker Identity Services 7.5

Posted June 26, 2013    Sarah Lieber

We are very excited for the announcement of our latest release of PowerBroker Identity Services 7.5, the industry’s most effective solution for bridging Linux, UNIX and Mac OS X assets into Active Directory. This latest update provides the strongest communications encryption to date, as well as the utmost flexibility with regards to event notification and management….

Tags:
, , , , , , , , ,
img-oracle-logo

BeyondTrust & Oracle, The Perfect Partnership

Posted April 8, 2013    BeyondTrust Product Management

No one will dispute that Oracle is a heavyweight when it comes to the relational database market, but Oracle is far more than a one trick pony.  Oracle has a plethora of enterprise products and hardware solutions that will fit the needs of almost any business.  However the key to success for many of the…

Tags:
, , , , , , ,