Analytics
1/24/2013
11:34 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BeyondTrust Releases PowerBroker For Windows 5.5

PowerBroker for Windows 5.5 includes advanced analytics and reporting capabilities

CARLSBAD, Calif. – January 23, 2013 – BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced the release of PowerBroker for Windows 5.5, the industry’s first identity management solution able to leverage the security context provided by vulnerability and privilege data, which allows customers to more effectively manage the risk of their Windows systems. This release also includes integration with the award-winning Retina CS Threat Management Console, providing robust, enterprise-ready analytics and reporting capabilities for PowerBroker Windows deployments, as well as support for implementing least privilege on Windows 8 systems.

PowerBroker for Windows is the fastest, easiest and most cost-effective way to secure Windows systems through the implementation of least privilege. It reduces help desk burdens and costs, while increasing the security of the Windows infrastructure. This new release allows IT organizations to effortlessly benefit from system and application vulnerability data when considering the requirements of elevated privileges for users, tasks and applications. Employing this approach, BeyondTrust customers can make more informed security strategy decisions, based on a system’s overall risk and susceptibility to attacks.

"The high velocity of change in today’s enterprise infrastructure often means security teams are making critical business decisions based on threats, regardless of the actual context of those threats,” said Brad Hibbert, executive vice president of product engineering at BeyondTrust. “This new product release allows organizations to make more effective security decisions, by delivering the context that can only be provided by fusing both vulnerability and privileged identity information.”

BeyondTrust is dedicated to helping their customers meet today’s security challenges by providing innovative security and compliance solutions. A common challenge with privilege management is the need to take a system’s overall risk into context when deciding what level of privileges a user or system should be given. Leveraging the real-time application events provided by PowerBroker for Windows, the BeyondTrust threat engine’s patent pending virtual application scans enable immediate alerting and threat prioritization of vulnerable application usage enabling more proactive remediation of the most critical and vulnerable assets.

Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the most pressing questions in security – what to fix first, what to fix next and why. Retina CS does this through unmatched security intelligence and analytics for an entire IT landscape.

Want to Learn More?

Product experts from BeyondTrust will be hosting a public webcast to discuss the new developments of PowerBroker for Windows 5.5, specifically how you can leverage vulnerability data to reduce the risk of corporate desktops and servers. Register here: https://www1.gotomeeting.com/register/730958713

Availability

For existing customers of the product, PowerBroker for Windows 5.5 is available as a free upgrade. For those interested in learning more and to obtain a free trial, please visit: http://www.beyondtrust.com/Products/PowerBrokerForWindows/

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

CVE-2015-0915
Published: 2015-05-21
Cross-site scripting (XSS) vulnerability in RAKUS MailDealer 11.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted attachment filename.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.