Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

7/31/2012
04:14 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BeyondTrust Launches PowerBroker Mobile

New offering integrates context-aware management with vulnerability and patch information

CARLSBAD, Calif. – July 25, 2012 – BeyondTrust, the only security solution vendor providing Context-Aware Security Intelligence, today announced the release of PowerBroker Mobile, the first mobile health and security solution to integrate context-aware management with vulnerability and patch information. The new offering represents the next generation of mobile device management (MDM) by providing remote administrative functions for mobile devices and vulnerability management for applications, operating systems and device configuration.

“The rapid proliferation of mobile devices in the enterprise is changing traditional IT environments and unfortunately traditional MDM solutions haven’t kept pace,” said Brad Hibbert, executive vice president, product engineering at BeyondTrust. “Managing the health and risks associated with mobile devices shouldn't be so costly and complex and that's why we're introducing PowerBroker Mobile to the market."

PowerBroker Mobile is a complete mobile device provisioning and configuration platform, with policy management for virtual private networks (VPNs), email, passwords, device encryption, remote locking GPS tracking, and remote wipe. Organizations can now enable mobile governance, risk and compliance (GRC) with rule-driven actions that instantly identify governance and compliance issues and report on critical risks.

BeyondTrust’s new SaaS-based offering requires no infrastructure to manage and no investment in new appliances, and can be deployed rapidly by an enterprise within minutes with new users and devices being enrolled within seconds. As Gartner’s recent 2012 Magic Quadrant for Mobile Device Management Software report notes that while MDM is primarily sold as on-premises software and around 85 percent of MDM licenses are premises-based. However, as more cloud/SaaS offerings emerge, and as enterprises need to scale to more than 30,000 supported devices, cloud-based systems will continue to grow.

“With PowerBroker Mobile we’re bridging policy management and mobile health by taking vulnerability assessment information as part consideration,” said Hibbert. “Our goal is to provide organizations a solution that easily integrates management functionality with security information, for any user that brings their own devices to work.”

As part of the eEye Digital Security acquisition, the PowerBroker product portfolio is now offering its first mobile solution with vulnerability assessment technologies. PowerBroker Mobile is the first mobile product that integrates award-winning Retina CS technology, the only unified vulnerability and compliance management solution that provides security risk discovery, prioritization, remediation, and reporting across an entire dynamic IT infrastructure.

Key features to PowerBroker Mobile include:

User definable ability to create rules and take action based on Device Threat Score Pre-scan applications to determine the threat score prior to installation Operating System profiling to determine when a device is out of date and that there’s an update available Application interface to view assets and applications by Risk, New Device, Dormant, Update Available, or even potential rogue connections Application permissions to critical device API’s and functions SaaS-based solution for mobile devices within your infrastructure and devices operating outside of an enterprise’s perimeter.

PowerBroker Mobile provides complete coverage for Android, Apple iOS, Blackberry and ActiveSync connected devices. For more information and a free trial of PowerBroker Mobile, please visit: www.beyondtrust.com/mobile

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21510
PUBLISHED: 2021-03-08
Dell iDRAC8 versions prior to 2.75.100.75 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary ‘Host’ header values to poison a web-cache or trigger redirections.
CVE-2020-27575
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.
CVE-2020-27576
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by cross-site scripting (XSS). Users are able to create folders in the web application. The folder name is insufficiently validated resulting in a stored cross-site scripting vulnerability.
CVE-2020-27838
PUBLISHED: 2021-03-08
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulner...
CVE-2021-21503
PUBLISHED: 2021-03-08
PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in a command. The Compadmin user could potentially exploit this vulnerability, leading to potential privileges escalation.