BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

The University of Winchester Selects PowerBroker Desktops

Posted June 14, 2011    Peter McCalister

The University of Winchester is an educational institution in the United Kingdom with a strong heritage and innovatice teaching model. Their 5,900+ students enjoy educational challenges in 17 different departments at the hands of over 650 staff members.

With an environment consisting of predominantly students, the University found itself in an unusual IT situation. Over 1,500 Windows desktops operate over 7,000 user accounts: managing such a network is a large task! When you add in remote desktops and necessary applications that require admin rights to run, the conundrum increases significantly. While the University’s IT team understood that eliminating administrator rights would increase security and compliance, as well as decrease the risk of malware, it was a difficult endeavor to put in place. Because of the amount of users, as well as a large number of legacy applications requiring admin rights to run, the IT management team were unsure of how to manage the access rights while maintaing necessary productivity levels.

This is where BeyondTrust’s PowerBroker Desktops came in. The University of Winchester was first drawn to the solution from a webinar based on Desktop Standard. A year later, PowerBroker Desktops (then known as Privilege Manager) was evaluated and selected as the solution to satisfy security, compliance, and productivity. The biggest benefit was being able to lock down users while still allowing them to run all required applications.

Leave a Reply

Additional articles

PowerBroker for Unix & Linux helps prevent Shellshock

Posted September 25, 2014    Paul Harper

Like many other people who tinker with UNIX and Linux on a regular basis, BASH has always been my shell of choice.  Dating back to the early days moving from Windows to a non-Windows platform, mapping the keys correctly to allow easy navigation and control helped ensure an explosion of use for the shell. Unfortunately,…

Bash “Shellshock” Vulnerability – Retina Updates

Posted September 24, 2014    BeyondTrust Research Team

A major vulnerability was recently discovered within bash which allows arbitrary command execution via specially crafted environment variables. This is possible due to the fact that bash supports the assignment of shell functions to shell variables. When bash parses environment shell functions, it continues parsing even after the closing brace of the function definition. If…

pbps-blog3

7 Reasons Customers Switch to Password Safe for Privileged Password Management

Posted September 24, 2014    Chris Burd

It’s clear that privileged password management tools are essential for keeping mission-critical data, servers and assets safe and secure. However, as I discussed in my previous post, there are several pitfalls to look out for when deploying a privileged password management solution. At this point, you may be wondering how BeyondTrust stacks up. With that,…

Tags:
, , , , ,