Analytics
1/24/2013
11:34 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BeyondTrust Releases PowerBroker For Windows 5.5

PowerBroker for Windows 5.5 includes advanced analytics and reporting capabilities

CARLSBAD, Calif. – January 23, 2013 – BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced the release of PowerBroker for Windows 5.5, the industry’s first identity management solution able to leverage the security context provided by vulnerability and privilege data, which allows customers to more effectively manage the risk of their Windows systems. This release also includes integration with the award-winning Retina CS Threat Management Console, providing robust, enterprise-ready analytics and reporting capabilities for PowerBroker Windows deployments, as well as support for implementing least privilege on Windows 8 systems.

PowerBroker for Windows is the fastest, easiest and most cost-effective way to secure Windows systems through the implementation of least privilege. It reduces help desk burdens and costs, while increasing the security of the Windows infrastructure. This new release allows IT organizations to effortlessly benefit from system and application vulnerability data when considering the requirements of elevated privileges for users, tasks and applications. Employing this approach, BeyondTrust customers can make more informed security strategy decisions, based on a system’s overall risk and susceptibility to attacks.

"The high velocity of change in today’s enterprise infrastructure often means security teams are making critical business decisions based on threats, regardless of the actual context of those threats,” said Brad Hibbert, executive vice president of product engineering at BeyondTrust. “This new product release allows organizations to make more effective security decisions, by delivering the context that can only be provided by fusing both vulnerability and privileged identity information.”

BeyondTrust is dedicated to helping their customers meet today’s security challenges by providing innovative security and compliance solutions. A common challenge with privilege management is the need to take a system’s overall risk into context when deciding what level of privileges a user or system should be given. Leveraging the real-time application events provided by PowerBroker for Windows, the BeyondTrust threat engine’s patent pending virtual application scans enable immediate alerting and threat prioritization of vulnerable application usage enabling more proactive remediation of the most critical and vulnerable assets.

Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the most pressing questions in security – what to fix first, what to fix next and why. Retina CS does this through unmatched security intelligence and analytics for an entire IT landscape.

Want to Learn More?

Product experts from BeyondTrust will be hosting a public webcast to discuss the new developments of PowerBroker for Windows 5.5, specifically how you can leverage vulnerability data to reduce the risk of corporate desktops and servers. Register here: https://www1.gotomeeting.com/register/730958713

Availability

For existing customers of the product, PowerBroker for Windows 5.5 is available as a free upgrade. For those interested in learning more and to obtain a free trial, please visit: http://www.beyondtrust.com/Products/PowerBrokerForWindows/

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7178
Published: 2014-11-28
Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function.

CVE-2014-7850
Published: 2014-11-28
Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.

CVE-2014-8423
Published: 2014-11-28
Unspecified vulnerability in the management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to execute arbitrary commands via unknown vectors.

CVE-2014-8424
Published: 2014-11-28
ARRIS VAP2500 before FW08.41 does not properly validate passwords, which allows remote attackers to bypass authentication.

CVE-2014-8425
Published: 2014-11-28
The management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to obtain credentials by reading the configuration files.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?