BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘windows security’

Least Privilege on Windows Desktops and Servers

We have all seen the news. Least privilege attacks on the NSA and companies like Target have lead to elevated privileges on sensitive systems and access to confidential data. Securing administrative privileges on desktops and servers is beginning to take center stage for many organizations since low level entry points are now being used to…

Post by Morey Haber February 13, 2014
Tags:
, , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
retinacs-dashboard

Our Newest Product Release: Retina CS 4.5

We are very excited for our latest release of Retina CS 4.5. With this release, the Retina CS platform continues to extend our leadership in risk identification and prioritization. By integrating the PowerBroker product portfolio with Retina CS, our customers are able to combine vulnerability data with privileged identity and password management risk intelligence, which provides them with improved situational…

Post by Sarah Lieber June 13, 2013
Tags:
, , , , , , , , , ,
PBW with RI

Our Newest Product Release: PowerBroker for Windows 6.0

We’re very excited to announce the release of PowerBroker for Windows 6.0, the industry’s first identity management solution able to leverage least privilege and vulnerability data scanned by the award winning Retina CS Threat Management Console. This allows our customers to take a system’s overall risk into context when deciding what level of privileges a user or…

Post by Sarah Lieber June 5, 2013
Tags:
, , , , , , , , , ,
session-viewer-pbw

Tech Tip: PowerBroker for Windows 6.0 Sneak Peek

Have you ever wanted to see what activities someone has performed inside one of your line-of-business apps for troubleshooting purposes? Maybe you just want to monitor what activities a network administrator performed on your Exchange Server to track down a configuration change. Well, we’ve got an exciting new feature in the upcoming release of PowerBroker…

Post by Peter Beauregard May 16, 2013
Tags:
, , , , ,
penny

5 steps to securing the small business (that don’t cost a penny)

For many small businesses there are considerable restraints on both budget and personnel that can make implementing a good security practice feel like an insurmountable challenge. Recent news gives us a constant reminder of the threats we all face from hactivists, electronic espionage, and good old fashioned script kiddies out to cause damage. These threats…

Post by Andy Clark May 1, 2013
Tags:
, , , , , , , , ,
security-people

It’s not about the security, it’s about the people

I’ve said it before and I’ll say it again, I’m a big fan of the Doctor Who series. I was watching a recent episode where they needed to hack into a computer system. The Doctor didn’t think Clara, the current leading lady, could do it because the security was too tight. She replied simply, “It’s…

Post by Jason Silva April 25, 2013
Tags:
, , , , , , , , ,