BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘network security’

scmag1-98x98

BeyondTrust Receives 5 Star Rating from SC Magazine

Recently our UVM20 Security Management Appliance received a perfect 5-star review + “Best Buy” recognition from SC Magazine. Read the full review here. The UVM20 includes several pre-installed and pre-configured solutions: Retina Network Security Scanner, PowerBroker for UNIX/Linux, and PowerBroker for Windows, plus our patch management, regulatory reporting and configuration compliance modules — in addition…

Post by Sarah Lieber February 4, 2014
Tags:
, , , , , , , ,
5things-oraclebtwebinar-screenshot

The 5 Things Every Linux Administrator Should (and Should Not) Do When It Comes to Privileged Account Management

When it comes to privileged account management the list of things an administrator can do to protect their environment is seemingly never ending. Last week we hosted a webinar with Oracle Linux and presented a list of 5 things every Linux administrator should, and should not, do when managing privileged accounts. Given the current security…

Post by Sarah Lieber February 3, 2014
Tags:
, , , , ,

Top 8 Security Insights for 2014

Recently our VP of Marketing, Mike Yaffe, wrote an insightful piece, Top 8 Security Insights for 2014, which was featured on a few publications last week. This was a “what we’re predicting in 2014″ type of article that goes into predictions and expectations for the new year around security and privilege. An excerpt and link to the…

Post by Sarah Lieber December 23, 2013
Tags:
, , , , , , ,
Welcome to BeyondSaaS IMg

BeyondSaaS Adds Diversity for Vulnerability Management

BeyondTrust has a wide variety of architectures for Retina Enterprise Vulnerability Management. It can be installed on premise as software or appliance, on physical hardware or virtualized assets, and even in an all mixed mode environment combining any of the four. BeyondTrust has now extended that offering with BeyondSaaS to add a fifth option. This…

Post by Morey Haber November 18, 2013
Tags:
, , , , , ,
saas-new-scan-job-2013

BeyondSaaS

In the next few weeks, you will see the BeyondTrust marketing engine hit warp speed. Pure power and energy will drive this unstoppable force showcasing the next generation of BeyondTrust technology.  BeyondSaaS is an easy-to-use, self service, cloud-based vulnerability assessment scanning solution that addresses perimeter-based assets currently not addressed due to cost or incomplete vulnerability…

Post by Morey Haber November 4, 2013
Tags:
, , , , , ,

The 5 Keys to Context-Aware Vulnerability Management

Retina not only identifies security exposures across your entire IT landscape, but also gives you the insight you need to better understand, mitigate and communicate risk. Check out this video to see what makes Retina the most context-aware vulnerability management solution on the market. Learn more about Retina here. The 5 Keys to Context-Aware Vulnerability…

Post by Sarah Lieber October 28, 2013
Tags:
, , , , , ,
CNN-Syria-Maiffret

Marc Maiffret Interviewed on CNN: the ‘hacking war’ between the US and Syria

Last week CNN broadcast an investigative story about a potential ‘hacking war’ between the US and Syria, in light of possible US military strikes on Syria.  They wanted to know more about the ‘Syrian Electronic Army’, which shut down the NY Times website last week.  So the CNN team called on Marc to help explain…

Post by Mike Yaffe September 4, 2013
Tags:
, , , , , , ,
FIMScreenRename_2_shadow

A Use Case for File Integrity Monitoring within PowerBroker for Windows

As most of you are aware, PowerBroker for Windows v6 introduced File Integrity Monitoring (FIM) into the software.  For those of you who did not know this, FIM allows an Admin to specify protections over files/folders so these assets can only be modified by certain users or service accounts.  It also protects against renaming the…

Post by Jason Silva August 22, 2013
Tags:
, , , ,

August VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Post by Qui Cao August 19, 2013
Tags:
, , , , , , , , , , ,
New-Audit-Review-screenshot

Did you know? Create custom audit views and reports with PowerBroker Auditor for Active Directory

Did you know about the create custom audit views and reports feature in the PowerBroker Auditor for Active Directory solution?  Even though there are already around 200 built-in audit views that ship with the product organizations need to be able to target specific information for their environment and the task that is at hand. Needless…

Post by Morgan Holm July 31, 2013
Tags:
, , , , , , , , , ,