Analytics
1/24/2013
11:34 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

BeyondTrust Releases PowerBroker For Windows 5.5

PowerBroker for Windows 5.5 includes advanced analytics and reporting capabilities

CARLSBAD, Calif. – January 23, 2013 – BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced the release of PowerBroker for Windows 5.5, the industry’s first identity management solution able to leverage the security context provided by vulnerability and privilege data, which allows customers to more effectively manage the risk of their Windows systems. This release also includes integration with the award-winning Retina CS Threat Management Console, providing robust, enterprise-ready analytics and reporting capabilities for PowerBroker Windows deployments, as well as support for implementing least privilege on Windows 8 systems.

PowerBroker for Windows is the fastest, easiest and most cost-effective way to secure Windows systems through the implementation of least privilege. It reduces help desk burdens and costs, while increasing the security of the Windows infrastructure. This new release allows IT organizations to effortlessly benefit from system and application vulnerability data when considering the requirements of elevated privileges for users, tasks and applications. Employing this approach, BeyondTrust customers can make more informed security strategy decisions, based on a system’s overall risk and susceptibility to attacks.

"The high velocity of change in today’s enterprise infrastructure often means security teams are making critical business decisions based on threats, regardless of the actual context of those threats,” said Brad Hibbert, executive vice president of product engineering at BeyondTrust. “This new product release allows organizations to make more effective security decisions, by delivering the context that can only be provided by fusing both vulnerability and privileged identity information.”

BeyondTrust is dedicated to helping their customers meet today’s security challenges by providing innovative security and compliance solutions. A common challenge with privilege management is the need to take a system’s overall risk into context when deciding what level of privileges a user or system should be given. Leveraging the real-time application events provided by PowerBroker for Windows, the BeyondTrust threat engine’s patent pending virtual application scans enable immediate alerting and threat prioritization of vulnerable application usage enabling more proactive remediation of the most critical and vulnerable assets.

Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the most pressing questions in security – what to fix first, what to fix next and why. Retina CS does this through unmatched security intelligence and analytics for an entire IT landscape.

Want to Learn More?

Product experts from BeyondTrust will be hosting a public webcast to discuss the new developments of PowerBroker for Windows 5.5, specifically how you can leverage vulnerability data to reduce the risk of corporate desktops and servers. Register here: https://www1.gotomeeting.com/register/730958713

Availability

For existing customers of the product, PowerBroker for Windows 5.5 is available as a free upgrade. For those interested in learning more and to obtain a free trial, please visit: http://www.beyondtrust.com/Products/PowerBrokerForWindows/

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.