BeyondTrust

Displaying 1-24 of 24 results

  • Case Studies // Jan 2014

    XING Improves Security and Transparency of Access Rights with PowerBroker

    XING is the social network for business professionals. Their challenges are to ensure a higher level of security; improve transparency of access rights; use Active Directory (AD) integration; and reduce the time spent for setting up users and individual rights. They chose to PowerBroker from BeyondTrust overcome these challenges. They...

    Provided By BeyondTrust

  • White Papers // May 2013

    Take Back Control of Your Active Directory Auditing

    Every organization needs to have management tools that allow them seamless control over all aspects of their Active Directory environment. Uptime is extremely important for every organization and every minute that Active Directory is not functioning properly could cause a financial loss. Administrators need tools that can provide them with...

    Provided By BeyondTrust

  • White Papers // Feb 2013

    Headlines vs. Reality: Survey Report: How Do IT Security Professionals Prioritize?

    In this report, BeyondTrust shares the results and analysis of a recent industry survey. Cyber threats that don’t make headlines are in fact the ones causing concern for IT security professionals. The survey, which polled 1677 respondents, demonstrated that headline-driving attacks are not what keep IT security professionals or executives...

    Provided By BeyondTrust

  • White Papers // Feb 2013

    The Need for Vulnerability Assessment and Remediation: What My CIO Needs to Know

    This paper examines the importance of vulnerability assessment and the common myths surrounding security protection. Today’s network environments are dynamic, requiring a multitude of defense measures to effectively prevent attacks and efficiently mitigate vulnerabilities across the entire enterprise. Organizations must not only be aware of threats, but also the impact...

    Provided By BeyondTrust

  • White Papers // Jan 2013

    Avoiding the Top 5 Vulnerability Management Mistakes

    This guide will outline the top five mistakes around vulnerability management and how to avoid them to protect critical IT assets and improve your security posture, while reducing costs.

    Provided By BeyondTrust

  • White Papers // Dec 2011

    How to Avoid the High Cost of Security Audits

    The majority of today's security regulations are centered on identity and policy management. These most directly affect companies serving the government, processing credit card payments, or handling medical or financial records. Let us walk you through the advantages and disadvantages of each approach.

    Provided By BeyondTrust

  • White Papers // Aug 2011

    Goldie Locks and the Three Least Privileged Desktops eBook by Derek Melber

    Curious about how least privilege applies to you and your organization? Let Goldie Locks show you in this new eBook written by Microsoft MVP Derek Melber. In the story, Goldie Locks plays the role of a recent college graduate, with degrees in marketing and multimedia communications, who is just starting...

    Provided By BeyondTrust

  • White Papers // Aug 2011

    Building a Secure and Compliant Windows Desktop by Derek Melber, Microsoft MVP, MCSE, CISM

    Improving desktop security is a priority for nearly all companies. This is fueled by an increased recognition of the threat unsecured desktops pose, as well as a need to meet compliance regulations. However, most companies have struggled with implementing new security solutions. Removing administrator rights from end users when they...

    Provided By BeyondTrust

  • White Papers // Aug 2011

    Extending the Value of Group Policy Securely & Effectively By Darren Mar-Elia

    Group Policy is the primary mechanism within the Windows Operating System for managing security configuration. It generally does this in a scalable and reliable fashion. It also provides an extensibility model such that third-party vendors can extend what security settings (or other settings) can be configured using Group Policy. In...

    Provided By BeyondTrust

  • White Papers // Mar 2011

    Meeting the Access Security Requirements of Sec. 404 of the Sarbanes-Oxley Act in a Heterogeneous UNIX/Linux Environment

    PowerBroker? Servers works to protect the integrity of data across heterogeneous UNIX/Linux systems to help bring your IT systems into compliance especially with the SOX section 404 requirements as outlined by various over site boards such as COBIT, ISACA, ISO and the Guide to the Assessment of IT General Controls...

    Provided By BeyondTrust

  • White Papers // Oct 2010

    From Least Privilege to Best Privilege on your Windows Desktops

    Balancing the needs of the user with the needs of the security folks has always been a huge challenge. This incongruity often comes to a head on the Windows desktop, which is the main entry point for the user into an enterprise network. Darren Mar-Elia, Microsoft Group Policy MVP, examines...

    Provided By BeyondTrust

  • White Papers // Oct 2010

    How Secure Is Your Sudo?

    CISOs managing large IT environments, combined with the "many eyes" in the open source community, are consistently discovering that sudo creates security, compliance and productivity challenges to enterprises seeking to protect critical assets. By examining the good, the bad and the ugly of the sudo solution, enterprises will learn that...

    Provided By BeyondTrust

  • White Papers // Oct 2010

    Securing Privilege Delegation in Public and Private Cloud Computing Infrastructure

    This white paper discusses the drivers for data centers moving to the cloud, the role of virtualization in both public and private cloud infrastructures and outlines the security and compliance implications of cloud computing - providing insight into the protection of sensitive data in the cloud via administrative access and...

    Provided By BeyondTrust

  • White Papers // Oct 2010

    Least Privilege Application Compatibility for Windows 7 Migrations

    Microsoft has done a great deal of exceptional work in improving Windows 7 from its predecessor, Windows Vista. Organizations who decided to skip the upgrade to Windows Vista, and go directly to Windows 7 should be excited. Windows 7 provides vast improvements over Windows XP and Windows Vista from a...

    Provided By BeyondTrust

  • Case Studies // May 2010

    VistaPrint Improves Security, Meets Productivity Demands

    VistaPrint is a leading online supplier of high-quality graphic design services. VistaPrint wanted to achieve a least privilege user environment and reduce virus and malware security issues at its call center without jeopardizing employee productivity. They chose BeyondTrust PowerBroker to overcome this challenge. VistaPrint began using BeyondTrust PowerBroker for desktops...

    Provided By BeyondTrust

  • White Papers // May 2010

    BeyondTrust PowerBroker for Virtualization

    PowerBroker for Virtualization provides a dedicated solution to centrally address risks from unmanaged administrative privileges in virtualized datacenter environments. In a secure and compliant environment, users privileged access to virtual resources are managed to give them access to only what they need to do their job. PowerBroker for Virtualization provides...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    A Process Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance

    This white paper outlines a sound process-based approach in protecting critical privileged accounts that are found in virtually every application, database and infrastructure device throughout enterprises. This paper will present BeyondTrust PowerKeeper as a solution to secure passwords for privileged accounts in heterogeneous IT environments. Through features such as automated...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    Privileged Access Lifecycle Management: How PALM Refines Strategy for Enterprise IT

    Strengthening security, maintaining compliance, and achieving efficiencies and economies of scale are top-of-mind issues for enterprise IT executives. In this paper, IDC analysts examine the role of identity and access management (IAM) solutions in addressing these needs and specifically looks at the role privileged access lifecycle management (PALM) can play...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    Improving Efficiency in IT Administration by Implementing Policy Automation

    Privileged access is critical for smooth ongoing administration of IT assets. At the same time, this access exposes an organization to security risks, especially regarding insiders. The right solution will provide centralized visibility into policies as well as actions taken related to privileged access control. This will ensure that there...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    Root Access Risk Control for the Enterprise

    Compliance efforts and security concerns have driven businesses to make substantial investments in threat control. Too often, however, these efforts pay far too little heed to the risks posed by poorly controlled access to administrative privilege in IT, which can have a hugely disproportionate impact on the business. In this...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    From Trust to Process: Closing the Risk Gap in Privileged Access Control

    In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the BeyondTrust approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.

    Provided By BeyondTrust

  • White Papers // Oct 2009

    The Pursuit of a Standardized Solution for Secure Enterprise RBAC

    Each RBAC implementation varies in its capabilities and method of management. In a multi-platform environment, these differences introduce higher administration hours and costs because the various RBAC models are not consistent in administration and operation methodology. The differences among these implementations also increase the potential for misconfiguration and related security...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    Preventing Data Breaches in Privileged Accounts Using Access Control

    It is critical that organizations are proactive in their approach to mitigating insider threats. Week-after week there are disturbing, d?j? vu-like stories of significant data breaches, arrests connected to insider attacks, or investigation reports emphasizing the necessity to control privileged accounts that hold highly sensitive data. This white paper explores...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    PCI DSS Compliance in the UNIX/Linux Datacenter Environment

    This document explains how BeyondTrust PowerBroker supports the Payment Card Industry Data Security Standard (PCI DSS) by limiting and tracking authorization to execute commands and programs that access servers and applications storing and using proprietary cardholder. BeyondTrust PowerBroker provides an auditable process that controls, monitors and records that access.

    Provided By BeyondTrust

  • White Papers // May 2013

    Take Back Control of Your Active Directory Auditing

    Every organization needs to have management tools that allow them seamless control over all aspects of their Active Directory environment. Uptime is extremely important for every organization and every minute that Active Directory is not functioning properly could cause a financial loss. Administrators need tools that can provide them with...

    Provided By BeyondTrust

  • White Papers // Mar 2011

    Meeting the Access Security Requirements of Sec. 404 of the Sarbanes-Oxley Act in a Heterogeneous UNIX/Linux Environment

    PowerBroker? Servers works to protect the integrity of data across heterogeneous UNIX/Linux systems to help bring your IT systems into compliance especially with the SOX section 404 requirements as outlined by various over site boards such as COBIT, ISACA, ISO and the Guide to the Assessment of IT General Controls...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    A Process Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance

    This white paper outlines a sound process-based approach in protecting critical privileged accounts that are found in virtually every application, database and infrastructure device throughout enterprises. This paper will present BeyondTrust PowerKeeper as a solution to secure passwords for privileged accounts in heterogeneous IT environments. Through features such as automated...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    Privileged Access Lifecycle Management: How PALM Refines Strategy for Enterprise IT

    Strengthening security, maintaining compliance, and achieving efficiencies and economies of scale are top-of-mind issues for enterprise IT executives. In this paper, IDC analysts examine the role of identity and access management (IAM) solutions in addressing these needs and specifically looks at the role privileged access lifecycle management (PALM) can play...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    Improving Efficiency in IT Administration by Implementing Policy Automation

    Privileged access is critical for smooth ongoing administration of IT assets. At the same time, this access exposes an organization to security risks, especially regarding insiders. The right solution will provide centralized visibility into policies as well as actions taken related to privileged access control. This will ensure that there...

    Provided By BeyondTrust

  • White Papers // Dec 2011

    How to Avoid the High Cost of Security Audits

    The majority of today's security regulations are centered on identity and policy management. These most directly affect companies serving the government, processing credit card payments, or handling medical or financial records. Let us walk you through the advantages and disadvantages of each approach.

    Provided By BeyondTrust

  • White Papers // Oct 2009

    Root Access Risk Control for the Enterprise

    Compliance efforts and security concerns have driven businesses to make substantial investments in threat control. Too often, however, these efforts pay far too little heed to the risks posed by poorly controlled access to administrative privilege in IT, which can have a hugely disproportionate impact on the business. In this...

    Provided By BeyondTrust

  • White Papers // Jan 2013

    Avoiding the Top 5 Vulnerability Management Mistakes

    This guide will outline the top five mistakes around vulnerability management and how to avoid them to protect critical IT assets and improve your security posture, while reducing costs.

    Provided By BeyondTrust

  • White Papers // Oct 2009

    From Trust to Process: Closing the Risk Gap in Privileged Access Control

    In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the BeyondTrust approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.

    Provided By BeyondTrust

  • White Papers // Feb 2013

    Headlines vs. Reality: Survey Report: How Do IT Security Professionals Prioritize?

    In this report, BeyondTrust shares the results and analysis of a recent industry survey. Cyber threats that don’t make headlines are in fact the ones causing concern for IT security professionals. The survey, which polled 1677 respondents, demonstrated that headline-driving attacks are not what keep IT security professionals or executives...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    The Pursuit of a Standardized Solution for Secure Enterprise RBAC

    Each RBAC implementation varies in its capabilities and method of management. In a multi-platform environment, these differences introduce higher administration hours and costs because the various RBAC models are not consistent in administration and operation methodology. The differences among these implementations also increase the potential for misconfiguration and related security...

    Provided By BeyondTrust

  • White Papers // Feb 2013

    The Need for Vulnerability Assessment and Remediation: What My CIO Needs to Know

    This paper examines the importance of vulnerability assessment and the common myths surrounding security protection. Today’s network environments are dynamic, requiring a multitude of defense measures to effectively prevent attacks and efficiently mitigate vulnerabilities across the entire enterprise. Organizations must not only be aware of threats, but also the impact...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    Preventing Data Breaches in Privileged Accounts Using Access Control

    It is critical that organizations are proactive in their approach to mitigating insider threats. Week-after week there are disturbing, d?j? vu-like stories of significant data breaches, arrests connected to insider attacks, or investigation reports emphasizing the necessity to control privileged accounts that hold highly sensitive data. This white paper explores...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    PCI DSS Compliance in the UNIX/Linux Datacenter Environment

    This document explains how BeyondTrust PowerBroker supports the Payment Card Industry Data Security Standard (PCI DSS) by limiting and tracking authorization to execute commands and programs that access servers and applications storing and using proprietary cardholder. BeyondTrust PowerBroker provides an auditable process that controls, monitors and records that access.

    Provided By BeyondTrust

  • White Papers // Oct 2010

    From Least Privilege to Best Privilege on your Windows Desktops

    Balancing the needs of the user with the needs of the security folks has always been a huge challenge. This incongruity often comes to a head on the Windows desktop, which is the main entry point for the user into an enterprise network. Darren Mar-Elia, Microsoft Group Policy MVP, examines...

    Provided By BeyondTrust

  • White Papers // Oct 2010

    How Secure Is Your Sudo?

    CISOs managing large IT environments, combined with the "many eyes" in the open source community, are consistently discovering that sudo creates security, compliance and productivity challenges to enterprises seeking to protect critical assets. By examining the good, the bad and the ugly of the sudo solution, enterprises will learn that...

    Provided By BeyondTrust

  • White Papers // Oct 2010

    Securing Privilege Delegation in Public and Private Cloud Computing Infrastructure

    This white paper discusses the drivers for data centers moving to the cloud, the role of virtualization in both public and private cloud infrastructures and outlines the security and compliance implications of cloud computing - providing insight into the protection of sensitive data in the cloud via administrative access and...

    Provided By BeyondTrust

  • White Papers // Oct 2010

    Least Privilege Application Compatibility for Windows 7 Migrations

    Microsoft has done a great deal of exceptional work in improving Windows 7 from its predecessor, Windows Vista. Organizations who decided to skip the upgrade to Windows Vista, and go directly to Windows 7 should be excited. Windows 7 provides vast improvements over Windows XP and Windows Vista from a...

    Provided By BeyondTrust

  • White Papers // Aug 2011

    Goldie Locks and the Three Least Privileged Desktops eBook by Derek Melber

    Curious about how least privilege applies to you and your organization? Let Goldie Locks show you in this new eBook written by Microsoft MVP Derek Melber. In the story, Goldie Locks plays the role of a recent college graduate, with degrees in marketing and multimedia communications, who is just starting...

    Provided By BeyondTrust

  • White Papers // Aug 2011

    Building a Secure and Compliant Windows Desktop by Derek Melber, Microsoft MVP, MCSE, CISM

    Improving desktop security is a priority for nearly all companies. This is fueled by an increased recognition of the threat unsecured desktops pose, as well as a need to meet compliance regulations. However, most companies have struggled with implementing new security solutions. Removing administrator rights from end users when they...

    Provided By BeyondTrust

  • White Papers // Aug 2011

    Extending the Value of Group Policy Securely & Effectively By Darren Mar-Elia

    Group Policy is the primary mechanism within the Windows Operating System for managing security configuration. It generally does this in a scalable and reliable fashion. It also provides an extensibility model such that third-party vendors can extend what security settings (or other settings) can be configured using Group Policy. In...

    Provided By BeyondTrust

  • White Papers // May 2010

    BeyondTrust PowerBroker for Virtualization

    PowerBroker for Virtualization provides a dedicated solution to centrally address risks from unmanaged administrative privileges in virtualized datacenter environments. In a secure and compliant environment, users privileged access to virtual resources are managed to give them access to only what they need to do their job. PowerBroker for Virtualization provides...

    Provided By BeyondTrust

  • Case Studies // May 2010

    VistaPrint Improves Security, Meets Productivity Demands

    VistaPrint is a leading online supplier of high-quality graphic design services. VistaPrint wanted to achieve a least privilege user environment and reduce virus and malware security issues at its call center without jeopardizing employee productivity. They chose BeyondTrust PowerBroker to overcome this challenge. VistaPrint began using BeyondTrust PowerBroker for desktops...

    Provided By BeyondTrust

  • Case Studies // Jan 2014

    XING Improves Security and Transparency of Access Rights with PowerBroker

    XING is the social network for business professionals. Their challenges are to ensure a higher level of security; improve transparency of access rights; use Active Directory (AD) integration; and reduce the time spent for setting up users and individual rights. They chose to PowerBroker from BeyondTrust overcome these challenges. They...

    Provided By BeyondTrust