BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘privileged account management’

gartner market guide image - aug 2014

Introducing the Gartner Market Guide for Privileged Account Management

Posted July 29, 2014    Chris Burd

Gartner recently released a new Market Guide for Privileged Account Management (PAM), and we’d like to share a complimentary copy with you. The report includes PAM market analysis and direction, vendor overviews, and recommendations for selecting PAM solutions for your environment. BeyondTrust is one of two representative vendors (out of 20) to address all solution…

Tags:
, , , , , , , ,
smart-rules-manager-assets

Where Passive Scanning Falls Short

Posted July 11, 2014    Morey Haber

In many sports, as in business, teams will promote a strategy to gain an edge – even if the concept is possibly flawed. Consider an American football hurry-up offense: will it cause the defense to stumble, or will it just exhaust the offense? The play has potential pros and cons, and many strategic technologies are…

Tags:
, , , , , , ,

Webcast Recap: “6 Best Practices for Privilege Management, Vulnerability Management, and IP Protection” with Larry Brock

Posted June 27, 2014    Chris Burd

In the latest on-demand webcast, BeyondTrust joins Larry Brock, the DuPont, USAF and NSA veteran and principal of Brock Cyber Security Consulting, to discuss “6 Best Practices for Privilege Management, Vulnerability Management, and IP Protection.” Below is a summary of key takeaways from the webcast, plus an on-demand video recording of the full presentation. Brock…

Tags:
, , , , ,

Webcast Recap: “Is Your User Security Program Risky or Risk-Focused?” with Dr. Eric Cole

Posted June 19, 2014    Chris Burd

When you’re trying to determine how to control and manage the biggest threats to your IT infrastructure, you need to start by considering several possible breach points and narrowing in on the most dangerous. But attackers aren’t just targeting Microsoft, Linux, or Mac systems. They’re targeting a system that’s much harder to secure: the human…

Tags:
, , , , ,
users-graphic-0614

Statistics, Claims, Marketing and Leadership in IT Risk Management

Posted June 12, 2014    Morey Haber

Good marketing plans and effective technology can place unmovable stakes in the ground in terms of statistics and claims. You see these every day in the form of ROI calculations, customer results, performance figures … the list goes on. The intention, to put it bluntly, is to point out differentiators that help customers select one…

Tags:
, , , , , ,
smart rules manager for vulnerabilities

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

Posted April 21, 2014    Morey Haber

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in…

Tags:
, , , , , ,
BI-5.1-user-asset-visibility-img

Understanding Who Has Access to What with BeyondInsight v5.1

Posted April 15, 2014    Morey Haber

Today, it’s my pleasure to introduce you to BeyondInsight version 5.1, the latest release of our IT Risk Management platform, which unifies several of our solutions for Privileged Account Management and Vulnerability Management. BeyondInsight v5.1 embodies BeyondTrust’s mission to give our customers the visibility they need to make smart decisions and reduce risk to their…

Tags:
, , , , , , , , , , , ,

Evolving Privileged Account Management for Maximum Operational Efficiency

Posted April 2, 2014    Gail Ferreira

We all want to make our lives easier, but how much privilege management is enough? At BeyondTrust, we see more and more organizations looking to simplify the tool sets used to manage their internal security and compliance environments. Historically, many organizations purchased privilege management solutions to address specific audit findings or challenges in isolation. This…

Tags:
, , , , ,
beyondtrust-dashboard-auditingprivaccessblog

Auditing Privileged Access on Windows

Posted March 20, 2014    Morey Haber

When a user is given privileged access to a Windows host, they gain access to a wide variety of tools to control the system. Everything from the GUI and Start Menu to PowerShell and command line allow system alteration and software installation. In truly secure world, no end users would have administrative privileges. However, we…

Tags:
, , , , , , , ,

BeyondInsight: Privilege and Vulnerability Management Unification

Posted February 18, 2014    Morey Haber

Fifteen years ago there was a revolution in information technology operations. Different teams that managed networks and systems merged their practices and technology under frameworks like Computer Associates Unicenter and IBM Tivoli. Today, these solutions have evolved to CA Spectrum, SolarWinds, and SpiceWorks. These are all fantastic technologies that have proven that the fusion of…

Tags:
, , , , , ,