Welcome to our content library. Feel free to browse.
Our security experts have compiled a plethora of resources together to help you get more value out
of BeyondTrust products and solutions.
Financial institution uses PowerBroker® Identity Services Enterprise Edition and Active Directory to establish one ID per user, centralize user and access administration for VMware ESX, enforce global password and security policies with group policy and sudo.
Gap Inc. Direct uses Red Hat Enterprise Linux and PowerBroker® Identity Services Enterprise Edition to save hundreds of thousands of dollars annually on reduced administrative and hardware costs associated with compliance and security requirements.
This leading financial services company was operating a customer service call center in India. The desktop workstations ran SUSE Enterprise Linux, which the company found to be a cost-effective choice for supporting its call center workers.
As a UNIX shop, the company also needed a solution that could perform the deep, credentialed scans required for real protection from vulnerabilities, while also protecting the system’s root password.
Tasked with the challenge of placing strict controls back in to the hands of our system administrators and meeting HIPAA requirements, University of Texas M.D. Anderson Cancer Center turned to BeyondTrust.
PowerBroker Desktops offers a simple, centralized solution, which reduces the threat posed by malware and elevates only necessary privileges. It satisfies all security protocols to restrict access to privileged users to a least privilege model.
Care New England uses PowerBroker Desktops to support over 4,800 desktops and over 10,000 desktop end users, which includes over 250 applications such as Horizon.
Essentially, I’m paid to act like a hacker. It’s my job to break software and get into systems.If I don’t get in, I’m not satisfied because I know real hackers don’t give up easily. With Retina, I always find vulnerabilities to exploit.
Retina and Iris combine to give us the confidence that when we go to sleep each night, we know our network will be safe and running properly the next morning. The products have also helped us achieve the proper balance for the level of security we need for our network.
Blink points out system vulnerabilities. It makes me aware of what is on our network and what needs to be addressed.
If hackers gained entry into a controller network, they could shut down a power plant and cause all kinds of problems. Obviously, we need to be able to detect those attacks and stop them. Blink helps us do just that.
The other thing to keep in mind is that eEye is constantly upgrading their software,” Foster said. “In the short time I’ve been a client, they’ve already made performance improvements and further simplified administration.
We had a checklist of features we wanted integrated into our endpoint security, including antispyware, a client firewall, intrusion prevention, vulnerability scanning and policy-based rules… Blink, with its many additional features, was about the same price as Symantec’s antivirus and antispyware alone.
When we were hit with a vulnerability, I was looking at our server logs and realized something was amiss," said Davis. "I shut our router down until I could figure it out, and what I learned was that SecureIIS saved us from a very serious attack. SecureIIS notified me that something unusual was going on and blocked it. That's the beauty of behavior-based security.