BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘security’

insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,
windows of opp-img1

Seizing Windows of Opportunity for Vulnerability Assessment

The change control process for many organizations dictates that vulnerability assessment scanning can only occur during predefined scan windows. During these times, teams are notified that an assessment will be conducted and that alerts from IDS/IPS sensors, SIEMS, and local AV agents should be ignored or whitelisted from the scanners. This is a very typical…

Post by Morey Haber April 1, 2014
Tags:
, , , , ,
PBW-Risk Report

Greylisting Applications with PowerBroker for Windows Risk Compliance

PowerBroker for Windows is designed to elevate privileges on an application based on rules. It does so using technology that does not alter the user but rather the security token for the application at runtime. The results allow a standard user to launch and interact with an application that requires administrative privileges, without changing the…

Post by Morey Haber February 10, 2014
Tags:
, , , , ,

Top 8 Security Insights for 2014

Recently our VP of Marketing, Mike Yaffe, wrote an insightful piece, Top 8 Security Insights for 2014, which was featured on a few publications last week. This was a “what we’re predicting in 2014″ type of article that goes into predictions and expectations for the new year around security and privilege. An excerpt and link to the…

Post by Sarah Lieber December 23, 2013
Tags:
, , , , , , ,

Showcasing Retina Network Security Scanner Unlimited with Marc Maiffret

Last week BeyondTrust’s CTO, Marc Maiffret, took us through an introduction, demo and Q&A of Retina Network Security Scanner Unlimited. Retina Network Security Scanner is the fastest, most mature vulnerability assessment solution on the market, and is now available for only $1,200 per year. Features available in Retina Network Security Scanner Unlimited include: Unlimited IP…

Post by Sarah Lieber October 29, 2013
Tags:
, , , , , ,
BT_Privilege Gone Wild Infograpic v1

Privilege gone wild! Our latest survey finds privileged users are out of control.

Did you know that 40% of employees have unnecessary access rights? What about that over 25% of employees admitted to having retrieved information not relevant to their job like financial, reports, salary info, HR and personnel docs? Now have I caught your attention? As our latest security survey proves, insider threats continue to be a…

Post by Sarah Lieber October 22, 2013
Tags:
, , , , , , , , , ,
retinacs-insight-scalability

Scalability Part Deuce

It was great to see a flood of email on the previous scalability blog. Thank you all for the emails directly to me on the topic. Based on the responses, I would be remiss not to cover the other three sides of scalability. First, is how we scale down. Retina is a family of solutions….

Post by Morey Haber October 9, 2013
Tags:
, , , , , ,
ScanMetrics-screenshot

Now Available: Retina Unlimited – $1,200 Unlimited IP Addresses

It has been over 15 years since we first introduced Retina, the Network Security Scanner, to the world. In those early days the vulnerability assessment space was still in its infancy with much of the focus being around scanning network based services for remotely exploitable vulnerabilities. Back then there were no compliance mandates or policies…

Post by Marc Maiffret October 8, 2013
Tags:
, , , , ,

August VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Post by Qui Cao August 19, 2013
Tags:
, , , , , , , , , , ,