BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘network security’

Welcome to BeyondSaaS IMg

BeyondSaaS Adds Diversity for Vulnerability Management

Posted November 18, 2013    Morey Haber

BeyondTrust has a wide variety of architectures for Retina Enterprise Vulnerability Management. It can be installed on premise as software or appliance, on physical hardware or virtualized assets, and even in an all mixed mode environment combining any of the four. BeyondTrust has now extended that offering with BeyondSaaS to add a fifth option. This…

Tags:
, , , , , ,
saas-new-scan-job-2013

BeyondSaaS

Posted November 4, 2013    Morey Haber

In the next few weeks, you will see the BeyondTrust marketing engine hit warp speed. Pure power and energy will drive this unstoppable force showcasing the next generation of BeyondTrust technology.  BeyondSaaS is an easy-to-use, self service, cloud-based vulnerability assessment scanning solution that addresses perimeter-based assets currently not addressed due to cost or incomplete vulnerability…

Tags:
, , , , , ,

The 5 Keys to Context-Aware Vulnerability Management

Posted October 28, 2013    Sarah Lieber

Retina not only identifies security exposures across your entire IT landscape, but also gives you the insight you need to better understand, mitigate and communicate risk. Check out this video to see what makes Retina the most context-aware vulnerability management solution on the market. Learn more about Retina here. The 5 Keys to Context-Aware Vulnerability…

Tags:
, , , , , ,
CNN-Syria-Maiffret

Marc Maiffret Interviewed on CNN: the ‘hacking war’ between the US and Syria

Posted September 4, 2013    Mike Yaffe

Last week CNN broadcast an investigative story about a potential ‘hacking war’ between the US and Syria, in light of possible US military strikes on Syria.  They wanted to know more about the ‘Syrian Electronic Army’, which shut down the NY Times website last week.  So the CNN team called on Marc to help explain…

Tags:
, , , , , , ,
FIMScreenRename_2_shadow

A Use Case for File Integrity Monitoring within PowerBroker for Windows

Posted August 22, 2013    Jason Silva

As most of you are aware, PowerBroker for Windows v6 introduced File Integrity Monitoring (FIM) into the software.  For those of you who did not know this, FIM allows an Admin to specify protections over files/folders so these assets can only be modified by certain users or service accounts.  It also protects against renaming the…

Tags:
, , , ,

August VEF Participant Wins a Kindle Fire

Posted August 19, 2013    Qui Cao

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Tags:
, , , , , , , , , , ,
New-Audit-Review-screenshot

Did you know? Create custom audit views and reports with PowerBroker Auditor for Active Directory

Posted July 31, 2013    Morgan Holm

Did you know about the create custom audit views and reports feature in the PowerBroker Auditor for Active Directory solution?  Even though there are already around 200 built-in audit views that ship with the product organizations need to be able to target specific information for their environment and the task that is at hand. Needless…

Tags:
, , , , , , , , , , ,
pbps-full-list-pbps-manages-incl-systems-and-accounts

Top 10 Reasons You Need Privileged Account Management Now

Posted July 29, 2013    Paul Harper

Don’t under estimate the complexity organizations face with managing and sharing access to privileged accounts. BeyondTrust has a wide variety of solutions that address the various challenges of privileged accounts.  Here are 10 key reasons our customers need and value the PowerBroker Password Safe solution: 1. EVERYONE has trouble managing privileged passwords – While some…

Tags:
, , , , , ,

Controlling User Accounts and Regulatory Compliance

Posted July 15, 2013    Morey Haber

PCI DSS Requirement 8 requires that organizations must be able to identify and log all user and administrative access to information systems and applications containing credit card and personally identifiable information. In addition, environments must also have a unique ID for every individual that will have computer access to these systems.  This simple requirement can…

Tags:
, , , , , , , , , , ,
gold-star

Getting a gold star in compliance

Posted July 9, 2013    Mike Yaffe

You know I realize that I’m getting older after I lived through “this is gonna be the big year for PKI (heard that for 4 straight years, and I’m still waiting)”, or “everyone will have a digital certificate on all their credit cards next year”, or “security and compliance are two different things.” As for…

Tags:
, , , , , , ,