BeyondTrust - Privilege Management

Company Description
BeyondTrust is a company which specialises in preventing data breaches by management of privilege accounts and vulnerabilities. It does so by its line of PowerBroker Privileged Account Management (PAM) and Retina Vulnerability Management (VM) solutions that share a common management, reporting and analytics platform, BeyondInsight. This platform not only provides an integration for the solutions, but also provide advanced Clarity Threat Analytics capabilities in order to better identify risks.

 

Products Overview

 

BeyondTrust has a wide range of products, catering to different kinds of users. They are broadly classified as Privilege Access Management and Vulnerability Management, coupled together under an IT Risk Management Platform.

 
 
For more references:
Sample Vulnerability Management Policy Feb 2105
Utilizing CAC and PIV Cards to Enforce Multi-Factor Authentication in Federal Government Agencies
 
 
 
Video: BeyondTrust: The Company at a Glance

 

BeyondTrust's  Press Release/Blog:

 


 

 

Product Description

 

Privilege Access Management is a modular, integrated solution that provides visibility and control over all privileged accounts and users. By uniting capabilities that many alternative providers offer as disjointed tools, the platform simplifies deployments, reduces costs, improves system security, and reduces privilege risks.

Privileged Password Management
  • PowerBroker Password Safe - enterprise password management solution for access control, manageability and audit of all types of privileged accounts.

 

Privilege Management

  • PowerBroker for Windows - enterprise password management solution for access control, manageability and audit of all types of privileged accounts.
  • PowerBroker for Unix & Linux - delegate roots tasks and authorisation on Linux or UNIX systems without ever disclosing the root password 
  • PowerBroker for Sudo -  a partial solution for Unix and Linux sudo management
  • PowerBroker for Mac -  reduces the risk of privilege misuse by enabling standard users on Mac OS to perform administrative task successfully without entering elevated credentials
  • PowerBroker for Virtualization & Cloud -  privilege management solution to delegate tasks and authorisation in virtualised datacenter environments without disclosing root passwords
  • PowerBroker for Databases -  lets database administrators and architects effectively control privileged entitlements across their heterogenous database systems. 

 

Active Directory Bridging

  • PowerBroker Identity Services "AD Bridge"  - allows you to integrate your Linux, UNIX and Mac OS X servers with Microsoft Active Directory 

 

Auditing and Protection 

  • PowerBroker Auditor & Recovery for Active Directory  - continuous object back up and recovery for instant roll backs when needed 
  • PowerBroker Auditor for File System - tighter security and control over File System resources across the enterprise
  • PowerBroker Privileged Explorer for Active Directory and File Systems  - automates analysing and nd reporting on who has access to Active Directory and File System permissions 
  • PowerBroker Auditor for Exchange  tracks and reports all changes made to all Exchange Server configuration, group, mailbox policies, information stored in a centralized audit log
  • PowerBroker Auditor for SQL Server -  centralised control, ease to SQL Server auditing and compliance
  • PowerBroker Server Auditing & Security Suite   encompasses centralised real-time change auditing for Active Directory, File Servers, Exchange, SQL and NetApp; offers the ability to restore Active Directory objects or attributes and helps to establish and enforce entitlements across the Windows infrastructure

 

For more references:

 

Video: Leveraging PowerBroker for Windows for Application Control

 

Product Description

 

Vulnerability Management is a vulnerability management software solution designed from the ground up to provide organizations with context-aware vulnerability assessment and risk analysis. Retina’s results-oriented architecture works with users to proactively identify security exposures, analyse business impact, and plan and conduct remediation across disparate and heterogeneous infrastructure.

 

It provides the following functions::
  • Results-driven reporting and analytics that provide relevant and actionable data to multiple stakeholders throughout the organisation
  • Enterprise-class scalability, flexibility and performance from software and appliances with the industry’s simplest licensing model
  • Zero-gap coverage of all devices enterprise-wide, including network, web, mobile, cloud and virtual infrastructure
  • A unified solutions platform addressing all phases of vulnerability management – from assessment and remediation, to endpoint protection and privileged identity management
  • A clear focus on providing customers with market-leading vulnerability management solutions that identify and mitigate threats to users and assets

 

Enterprise Vulnerability Management

  • Retina CS - vulnerability management software solution designed from the ground up to provide organizations with large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.

 

Network Security Scanning 

  • Retina Network Security Scanner - the security industry's most respected and validated vulnerability assessment tool to efficiently identify IT exposures and prioritize remediation enterprise-wide and also serves as a scan engine for Retina CS Enterprise Vulnerability Management.

 

Cloud-Based Vulnerability Assessment

  • BeyondSaaS Cloud-Based Scanning - easy, affordable solution for network perimeter vulnerability scanning and web application security assessment that enables your to quickly identify vulnerabilities and fixes with maximum security and minimal hassle.

 

Web Security Scanning and Protection

  • Retina Web Security Scanning - comprehensive application security testing solution designed for modern web and mobile applications that are built on technologies such as AJAX,  SOAP,WADL,XML,JSON,GWT  and CRUD operations.

 

Endpoint Protection/Local Assessment 

  • PowerBroker Endpoint Protection Platform - integrated multi-layered endpoint protection in a single, lightweight client that replaces multiple security agents, protecting against  Advanced Persistent Threats (APTs), known exploits, zero-days, and all other attack vectors.

 

 

 

 
 
 
Video: Retina CS - Enterprise Vulnerability Scanning

 

Product Description

 

BeyondInsight delivers a comprehensive view of the vulnerabilities that provide doors into an environment, as well as the privileges that present corridors to sensitive assets. This fusion of asset and user intelligence provides your organisation with the following capabilities (not exhaustive):

 

  • A centralized view of all assets and users in your environment. Its database contains information gathered via powerful onboard discovery capabilities, combined with data feeds from a variety of privilege and vulnerability management solutions.
  • The Clarity threat analytics engine which efficiently detects IT security threats that were previously lost amidst volumes of data, enabling you to identify and be alerted to users and assets displaying patterns of risky activity.
  • Powerful reporting engine keeps IT security and IT operations teams aligned and focused on business goals – whether that means complying with industry regulations like PCI DSS and HIPAA, or simply reducing your risk profile by employing least privilege where it makes the most sense.

 

By unifying BeyondTrust privileged account management and vulnerability management solutions, BeyondInsight provides single-pane visibility and control over user and asset risk.

 

 

 
 
 
Video: BeyondInsight Analytics and Reporting

 

 

  
Copyright 2016 Ace Pacific Pte Ltd All rights reserved . Site by SGIHUB.