Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.


Posts Tagged ‘PowerBroker Password Safe’


On Demand Webinar: How Hackers Can Steal Passwords

Posted September 11, 2015    BeyondTrust Software

This week, Security MVP, Paula Januszkiewicz, hosted a live webinar “How Hackers can Scratch off Secrets and Juicy Password Credentials from the Disk”. If you missed it, here is a quick expert and recording.


PowerBroker Password Safe 5.6: Advanced Workflow Control and New Cloud Connectors

Posted September 8, 2015    Martin Cannard

BeyondTrust has released version 5.6 of PowerBroker Password Safe, our solution for automating privileged password and privileged session management.

, ,

What Does Microsoft Local Administrator Password Solution Really Do?

Posted May 19, 2015    Morey Haber

LAPS is a feature that allows the randomization of local administrator accounts across the domain. Although it would seem that this capability overlaps with features in BeyondTrust’s PowerBroker Password Safe (PBPS), the reality is it is more suited for simple use cases such as changing the local Windows admin account and not much more.

, ,

8 Reasons Customers Switch to Password Safe for Privileged Password Management

Posted May 5, 2015    Scott Lang

It’s clear that privileged password management tools are essential for keeping mission-critical data, servers and assets safe and secure. However, as I discussed in my previous post, there are several pitfalls to look out for when deploying a privileged password management solution. At this point, you may be wondering how BeyondTrust stacks up.

, , , , , , , ,

Are you changing your passwords as often as the weather changes?

Posted April 20, 2015    Scott Lang

There is one thing that should change more frequently than the weather: Your privileged passwords. Why? If you’re like more than 25% of companies out there, then your current IT environment contains unmanaged accounts putting you at risk of data breaches and compliance violations, and you don’t have a process to control those accounts.

, , , , ,

PowerBroker Password Safe 5.5: Advanced Threat Analytics and Simplified SSH Key Management

Posted April 8, 2015    Scott Lang

BeyondTrust has released version 5.5 of PowerBroker Password Safe, our solution for automating privileged password and privileged session management. This new release features some exciting enhancements – especially around threat analytics and SSH key management. Read on for more.

, , , , , ,
Enterprise Password Management

On-Demand Webinar: The Dark and Bright Side of Enterprise Password Management

Posted March 12, 2015    BeyondTrust Software

New webinar featuring Security Expert MVP, Paula Januszkiewicz in a discussion on Enterprise Password Management.

, , ,

Overcoming the One Fatal Flaw of Enterprise Password Management

Posted February 9, 2015    Morey Haber

There are a wide variety of enterprise password management products available in the market – from high availability enterprise solutions to personal desktop tools. These products are delivered by vendors such as BeyondTrust and others like CyberArk, Thycotic, LastPass, and even Apple’s Keychain. The goal of all of these solutions is to simplify the storage,…

, , , ,

Advanced Threat Analytics Reveals Hidden Risks: Introducing BeyondInsight Clarity

Posted February 3, 2015    Chris Burd

BeyondInsight Clarity, now shipping standard with BeyondInsight v5.4, enables our customers to detect critical IT security threats previously lost amidst volumes of data, while identifying specific users, accounts and assets exhibiting patterns of risky activity.

, , , , , , , , ,

Managing Shared Accounts for Privileged Users: 5 Best Practices for Achieving Control and Accountability

Posted November 20, 2014    Scott Lang

How do organizations ensure accountability of shared privileged accounts to meet compliance and security requirements without impacting administrator productivity? Consider these five best practices…

, , , , , ,