BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘netsec’

August VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Post by Qui Cao August 19, 2013
Tags:
, , , , , , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
New-Audit-Review-screenshot

Did you know? Create custom audit views and reports with PowerBroker Auditor for Active Directory

Did you know about the create custom audit views and reports feature in the PowerBroker Auditor for Active Directory solution?  Even though there are already around 200 built-in audit views that ship with the product organizations need to be able to target specific information for their environment and the task that is at hand. Needless…

Post by Morgan Holm July 31, 2013
Tags:
, , , , , , , , , ,

Controlling User Accounts and Regulatory Compliance

PCI DSS Requirement 8 requires that organizations must be able to identify and log all user and administrative access to information systems and applications containing credit card and personally identifiable information. In addition, environments must also have a unique ID for every individual that will have computer access to these systems.  This simple requirement can…

Post by Morey Haber July 15, 2013
Tags:
, , , , , , , , , , ,
sclogoupdated_1448

Our CTO Writes for SC Magazine’s Threat of the Month: SCADA “sport fishing”

Our CTO, Marc Maiffret wrote for the SC Magazine column,Threat of the Month: SCADA “sport fishing” section yesterday. Read an excerpt below and read the full article here. What is it? SCADA is not just a focus because of its often critical deployments, but also because performing vulnerability research on SCADA systems is easy, like…

Post by Sarah Lieber July 2, 2013
Tags:
, , , , , , , ,
guy-stress-m

Do you want to do this the “hard” way?

Too often I see people working on what they can fix, what is easy. It’s like when I exercise, if I see progress I keep working at it but the problem areas (there are a lot of them) can wait until tomorrow. Over the past several years I see organizations doing a better job with…

Post by Mike Yaffe May 28, 2013
Tags:
, , , , ,
sclogoupdated_1448

BeyondTrust Retina CS Earns Perfect 5 Star Rating by SC Magazine

We are happy to announce that for the 5th year in a row, SC Magazine has given a glowing review of Retina CS Threat Management Console with 5 stars across all its judging categories. SC Magazine tests all products in the most logical way: they vulnerability or pen tested them directly. Their “…results were excellent and…

Post by Sarah Lieber February 4, 2013
Tags:
, , , , , , ,
patch-tuesday

Patch Tuesday June 2012: RDP broken, again. Stuxnet TTF, again.

This is shaping up to be an interesting Patch Tuesday with critical vulnerabilities being released across a combination of operating system components and client applications. In total there are 7 Microsoft Security Bulletins covering 26 distinct vulnerabilities in this June 2012 Microsoft Patch Tuesday. More than half of these vulnerabilities are rated as being likely…

Post by BeyondTrust Research Team June 12, 2012
Tags:
, , , , , ,
RiskMatrixbyVuln-5.14.12-98x98

Work Smarter with Retina Insight Threat Analyzers

It keeps happening over and over again. I speak to a prospect, and they do not want yet another vulnerability report with pages and pages of assets and vulnerabilities. Every tool vulnerability assessment scanner can produce this with various degrees of customization and consolidation but a 1,000 page report for a few dozen assets doesn’t…

Post by Morey Haber May 17, 2012
Tags:
, , , , , ,
Picture 3

BeyondTrust and eEye Acquisition Announcement Now On Demand

There’s been a good amount of buzz surrounding our announcement that BeyondTrust acquired eEye Digital Security. We’re very excited about it and the opportunity the combined company has to provide an unmatched protection strategy for both the internal and external threats that target today’s enterprise. A couple of days ago, executives from both BeyondTrust and…

Post by Sarah Lieber May 16, 2012
Tags:
, , , , , ,