BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Visit BeyondTrust Booth at RSA 2011 and Win an iPad

Posted February 14, 2011    Peter McCalister

If you are going to San Francisco for RSA this week (with or without a flower in your hair), then you should stop by the BeyondTrust booth #945 and check out the latest greatest privilege identity management solutions to eliminate admin rights across desktop, server and network devices as well as virtual and cloud environments.

You will also have a chance to play a hand of blackjack, check out our new partnership withQualys and maybe even win an iPad or two if you are spotted around the show wearing a “Good People Can Do Bad Things” button.

We will be demonstrating:

  • Auto Rules Generation for PowerBroker Desktops: showing a ground-breaking way to automatically generate least privilege rules saving countless days for new users spinning a privilege identity management solution up in enterprises large and small.
  • Possible Vulnerabilities in Your Current Desktop Least Privilege Solution: it turns out that all desktop solutions are not created equal when it comes to least privilege, and we can prove that some solution approached leave your vulnerable for hostile take-over.
  • PowerBroker Desktops: showing how to implement a least privilege windows desktop can save money and improve compliance
  • PowerBroker Server: showing how eliminating root access to Unix and Linux servers along with keystroke logging can provide a secure and compliant server, virtual server and cloud environment.
  • QualysGuard with PowerBroker: showing how vulnerability management and compliance scanning can be made more secure with PowerBroker.

Leave a Reply

Additional articles

normal-blog-img

New IT Security Best Practices for Maintaining “Business as Usual” Despite Evolving Threats

Posted August 13, 2014    Morey Haber

It’s time to get back to business. Here in the U.S., summer vacations are wrapping up and businesses are looking forward to closing out 2014. Over the past year, we’ve seen several incidents that warrant changes in the ways consumers make purchases and businesses conduct transactions. Consider last week’s theft of a whopping 1.2 billion…

Tags:
, , ,

Retina Vulnerability Audits – August 2014 Patch Tuesday

Posted August 12, 2014    BeyondTrust Research Team

The following is a list of Retina vulnerability audits for this August 2014 Patch Tuesday: MS14-043 - Vulnerability in Windows Media Center Could Allow Remote Code Execution (2978742) 34924 – Microsoft WMC Remote Code Execution (2978742) MS14-044 - Vulnerabilities in SQL Server Could Allow Elevation of Privilege (2984340) 34915 – Microsoft SQL Server Multiple Vulnerabilities (2984340) – 2008 34916 –…

patch-tuesday

August 2014 Patch Tuesday

Posted August 12, 2014    BeyondTrust Research Team

This August Microsoft has released nine security bulletins which account for a whole variety of critical vulnerabilities. The most critical bulletins are MS14-051 (Internet Explorer), MS14-045 (Kernel-mode), and MS14-049 (Windows Installer). MS14-043 fixes a critical code execution vulnerability within Windows Media Center (people still use that?). The vulnerability itself is specifically within a COM object…

Tags:
, , ,