BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘privilege management’

bestknownsecret-2

PowerBroker for Windows, Best Known Secrets – Collections

One of the best-known secrets about PowerBroker for Windows is the ability to logically group rules into Collections. This Best Practice allows you to organize rules based on almost any criteria and treat multiple rules as a single entity. This feature is most useful when: Rules require the same item-level targeting Organizing rules into physical…

Post by Morey Haber October 1, 2012
Tags:
, , , , ,
rsa-archer-egrc-2-680x393

Now Available! Direct Integration from Retina CS into RSA Archer eGRC

Yet another first for BeyondTrust and eEye Digital Security. Our combined companies are proud to release our first new direct integration from Retina CS into RSA Archer eGRC. The business value provides comprehensive vulnerability management data directly into Archer’s Threat Management system. Using direct database access from Archer’s Integration System, the eGRC platform harvests asset…

Post by Morey Haber June 1, 2012
Tags:
, , , , , ,
gear6-98x98

Configuration Mistakes Make for Costly Security Gaps

Earlier this week, Brian Prince over at Security Week posted an article on a subject that we’ve always been passionate about here at eEye, now BeyondTrust, Research – and that’s configuration.  More specifically, the incredible impact that smart, effective configuration can have on reducing attack surface for any size organization.

Post by Daniel Jacobowitz May 25, 2012
Tags:
, , ,