Vulnerabilities / Threats
8/7/2013
11:48 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

BeyondTrust Releases Free Tool for Auditing Google Apps

PowerBroker Auditor for Google Apps automates the tracking and simplifies reporting on Google Apps audit events for IT administrators

SAN DIEGO, Calif. – August 7, 2013 – BeyondTrust, the security industry's only provider of Context-Aware Security Intelligence, today announced the release of PowerBroker Auditor for Google Apps, available immediately, for free, to the BeyondTrust user community. PowerBroker Auditor for Google Apps was developed to ease the burdens associated with auditing these commonly used web applications for proper usage and compliance.

According to Google1, over 5 million businesses have made the shift to Google Apps for their cloud-based productivity efforts. Prior to the release of PowerBroker Auditor for Google Apps, IT admins have had to deal with the time consuming task of manually gathering audit events and creating reports for operations management, security and compliance officers, and internal and external auditors. Now, organizations are easily able to track and understand configuration changes and administrative activities for security and compliance reporting.

"While Google Apps is a great productivity suite for organizations, it's become a bit of a compliance headache for IT admins who are already resource-constrained by the need to prove ongoing compliance to critical government regulations," said Brad Hibbert, executive vice president of product strategy and operations at BeyondTrust. "Our goal at BeyondTrust is to give customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting. PowerBroker Auditor for Google Apps is doing just that."

PowerBroker Auditor for Google Apps allows IT administrators to track and report on a wide range of changes, including: users, groups, roles, email, calendar, chat, mobile, and more. With this new offering, events can be retrieved live for immediate review or collected on a desired schedule and saved in a database for historical reporting. Key user and event types can be filtered and reports can be exported to Excel, PDF and Word for further filtering, sorting and sharing.

PowerBroker Auditor for Google Apps is immediately available for free download at: http://go.beyondtrust.com/pba-ga

About BeyondTrust

BeyondTrust is the leading security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company's products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust

Twitter: http://twitter.com/beyondtrust

Blog: http://blog.beyondtrust.com

LinkedIn: http://www.linkedin.com/companies/beyondtrust

Facebook: http://www.facebook.com/beyondtrust

PR Contact:

Gutenberg Communications for BeyondTrust

Stefanie Cannon

P: 408.827.4361

E: stefanie@gutenbergpr.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.