Welcome to our content library. Feel free to browse.
Our security experts have compiled a plethora of resources together to help you get more value out
of BeyondTrust products and solutions.
What happens when employees and contractors are indiscriminately given administrative access – or other unnecessary privileges - to your organization’s servers and desktops? Is your organization at risk of unauthorized software installation, malware attacks, and even loss of proprietary data.
A demonstration of BeyondSaaS, a cloud-based vulnerability assessment solution that gives you an attacker’s-eye view of your IT perimeter. The solution delivers fast, efficient and affordable security assessments of your public-facing network infrastructure and web applications – providing you with in-depth vulnerability data and actionable remediation information. Start a free trial.
The result of over 15 years of development, BeyondSaaS is powered by one of the most effective and respected security tools on the market: BeyondTrust Retina. Key features include:
- External network scanning of unlimited IP addresses
- Black-box web application assessment
- Unlimited user accounts
- Assessments for PCI DSS and other compliance mandates
- Clear vulnerability reports, including trending and remediation action items
- Secure, two-factor authentication via Microsoft Live
- Encrypted data transmission
- No software or hardware install
- No license management
IT teams cannot get in the way of business. Yet, they also have a duty to the organization to protect critical information and prevent attacks. It turns out the path of least resistance for many attacks is to target device users and wait for them to make a mistake, thus providing an opening for compromise. A reliable way to reduce attack surface and take the human element (and fallibility) out of the equation is to restrict the access of the employees. By limiting what they can do on their devices, you basically protect them from themselves.
Unfortunately, this can be a controversial method, given that employees want to do what they want and IT cannot get in the way of what these business leaders think is important. Thus, to move this approach forward you'll need to use one part technology (to not totally break the user experience) and one part persuasion to assure business folks they will still get their job done, but more securely.
In this webcast, Securosis analyst Mike Rothman will cover:
- The kinds of attacks you face, and why traditional detection/prevention is failing.
- The importance of limiting what unsophisticated users can do on computing devices.
- How to roll out a least privilege approach without losing your job.
The latest version of the PCI DSS implements changes to effectively monitor and document how well vulnerability management programs are working within an organization. It is no longer possible to produce a report once a quarter without proof that a regular program is in place and that scanning and mediation activities are truly happening within acceptable time frames.
BeyondTrust has created a solution that goes above and beyond PCI DSS requirements by making it simpler and more efficient to generate applicable PCI reports, SLA's, and scorecards for management of your requirements. Join BeyondTrust's Morey Haber, Senior Director of Program Management, for a special, 30 minute demonstration, followed by live Q&A time of how our solution goes above and beyond meeting your PCI DSS requirements.
Morey Haber, Senior Director of Product Management at BeyondTrust, provides an overview of how our products can help you solve the problems caused by this interesting two word paradox.
Part 3 of a 3 part webinar series with SANS Analyst, Dave Shackleford, on Vulnerability Management. In our last installment of this series, we'll explore:
- Why developing a system inventory is a critical part of your security program
- How accurate inventory baselines can be used to develop metrics and reporting
- How more accurate asset identification can be used to improve audits and vulnerability management overall
Struggling to migrate from Windows XP before support ends April 2014? Want to follow best practices and compliance requirements to mitigate risk? Is it possible to easily limit user privileges?
The advantages for limiting and eliminating Admin rights include:
- Reducing exposure to malware or APTs that require Admin privileges to run
- Implementing the concept of least privilege to limit access to systems, applications, and data
- Allowing employees to perform their jobs, without impacting IT or end-user productivity
- Preventing the Help Desk from being flooded with selective elevation of admin privileges temporarily
Join BeyondTrust security experts to learn about how this forced change impacts your operations and what you can do today to minimize that impact.
Retina not only identifies security exposures across your entire IT landscape, but also gives you the insight you need to better understand, mitigate and communicate risk. Check out this video to see what makes Retina the most context-aware vulnerability management solution on the market.
BeyondTrust's CTO, Marc Maiffret, takes you through an introduction, demo and Q&A of Retina Network Security Scanner Unlimited. Retina Network Security Scanner is the fastest, most mature vulnerability assessment solution on the market, and is now available for only $1,200 per year. Features available in Retina Network Security Scanner Unlimited include:
- Unlimited IP scanning
- Web, database & virtual application scanning
- PCI DSS scanning and reporting
- SCADA scanning
- Regulatory reporting
- Scheduled scans
- Web-based tech support
Part 2 of a 3 part webinar series on Vulnerability Management. In the second part of this webcast series, you'll learn:
- How to sift through the "noise" of vulnerability scan data and find what's most useful
- Prioritization strategies and tactics for providing the most useful and relevant data to operations teams
- How to develop more accurate context for vulnerabilities, and determine the real risks you face
Group Policy continues to grow as the main tool to secure your Windows environment. However, Group Policy does not come with good management tools to help ensure you have a stable and secure environment. Managing, troubleshooting, and recovering from a Group Policy issue is not easy and certainly not obvious.
In this webinar, Derek Melber, Group Policy MVP, will give you pointers to help you manage, troubleshoot, and recover from Group Policy issues faster and with greater reliability.
It is all over the news! Employees are attacking their employer in an attempt to get money, notoriety, and revenge. Employees can use their corporate desktop, typically Windows based, to attack the network and gain a foothold into the data that they should not have access to. Closing off all of these attack surfaces requires an integrated approach of security and policy identifying the flaws 'attackers' are looking for and securing them, as well as implementing least privilege where necessary to reduce overall exposure.
In this webinar, join Derek Melber, Microsoft MVP, for an interactive presentation where he'll walk you through relevant use cases which demonstrate an effective approach to getting the best of both worlds of enforcing least privilege through effective policy management, while at the same time, ensuring the proper security and configuration of your Windows desktops.
Many think vulnerability management is a mature and staid technology. Au contraire, as the attackers continue to evolve and innovate their attacks, the definition of a "vulnerability" continuously evolves.
In this webcast, Securosis' Mike Rothman will revisit their "Vulnerability Management Evolution" research and discuss how to take a hard look at your VM environment. He'll also touch on the scenarios where you should consider moving to a new platform.
Derek Melber, Microsoft MVP, will walk you through the best practices and options available to help configure and secure your endpoints, as well as giving you real world techniques on how to best manage, create, troubleshoot, and deploy specific Group Policy settings and extensions.
As an MVP, Derek will be able to give you insight into areas of Group Policy that you did not even know existed making sure you walk away with actionable items to try right away!
In this webcast, you'll learn about real-time AD and GPO change monitoring for organizations of all sizes, how to enforce tighter security and audit procedures for your Active Directory environment, and how to decrease privileged identity security risks and protect against attacks and data loss resulting from the intentional or accidental misuse of privileged accounts and systems.
BeyondTrust has teamed up with SANS Analyst, Dave Shackleford, for a 3 Part Live Web Event Series. Learn what information tends to be most valuable when running scans and assessing vulnerabilities, which reports that have the most business and technical impact and how to work with business units and operations teams to define a more practical, useful vulnerability management program
Couldn't make it to MicroSoft's TechEd or TechEd Europe this year? No problem, we've got you covered. In this recording Derek Melber, Microsoft MVP walks you through all the new and exciting developments in Active Directory security and compliance!
Retina is the only vulnerability management platform designed from the ground up to provide IT security for professionals with context-aware vulnerability assessment and risk analysis. Watch this webcast and see firsthand the newest features and functionality in Retina 4.5.
BeyondTrust provides solutions that are beyond traditional security with a wide assortment of comprehensive IT security software products that can fit businesses of all sizes.
Enabling threat-aware policy and actionable analytics across best of breed security solutions from Least Privilege to Vulnerability Management.
Leading provider of Vulnerability Management, Privileged Identity Management and insider threats across physical, virtual, and cloud environments.
Retina can be deployed as a standalone scanner, distributed throughout an environment and integrated with Retina CS for enterprise deployments.
Retina CS centrally manages risk across the entire infrastructure. Close the gaps across the vulnerability management lifecycle to reduce risk for your organization.
mobile and cloud environments
PowerBroker Servers empower IT with the ability to delegate root tasks and authorization on Linux, UNIX, and Mac OS X without ever disclosing the highly sensitive root password.
Root Task Delegation
PowerBroker Desktops is the fastest and easiest way to secure desktops by removing admin rights without end user disruption by selectively elevating privileges.
See how to utilize PowerBroker Identity Services Enterprise for Active Directory authentication, centralized management and audit reporting across heterogeneous non-Windows environments.
Address the threat to data security and compliance posed by un-controlled privileged database users.
Protection and recovery, real-time auditing, user entitlement with interactive analysis, alerting and reporting for your critical Microsoft technologies.
Don has more than a decade of professional experience in the IT industry. He's the author of more than 35 IT books, including Windows PowerShell: TFM; VBScript, WMI, and ADSI Unleashed; Managing Windows with VBScript and WMI; and many more.
Sander’s specialty is helping people implement Linux solutions and he does this by writing books (he currently has almost 50 titles in different languages so far), by giving technical training courses and by working as a consultant.
Andras serves Security & Risk professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management.
Darren Mar-Elia is president and CTO of SDM Software, a Group Policy solutions company. He has over 20 years combined experience in information technology and software development. He was senior director of product engineering at DesktopStandard (acquired by Microsoft), and before that, served as CTO for Windows management solutions at Quest Software.
Derek Melber (MCSE, MVP), President and CEO of BrainCore.net Derek Melber, MCSE, MVP, is an independent consultant, speaker, author, and trainer. Derek’s latest book, The Group Policy Resource Kit by Microsoft Press, is his latest best-selling book covering all of the new Group Policy features and settings in Windows Server 2008 and Vista.
Learn and explore advanced functionality with PowerBroker for Windows with our team of Windows Privilege Management experts. Some points that are covered include: how to audit your environment before you deploy policy, troubleshooting problem applications, advanced policy targeting, and much more.
Learn the "Power and Pitfalls" of Group Policy and how it can help you better secure your organization and keep your users safe. Some points that are covered are: controlling local administrator passwords and group membership, how to map printers and more, using item level targeting to create dynamic desktop management, and much more.
Join this online event, co-hosted by 451 Research and BeyondTrust, to learn from us how you can begin to leverage this information to drive a more dynamic security strategy, as well as to hear Andrew Hay from 451 Research discuss how this data is impacting the enterprise today.
With eEye, vulnerability management is no longer just about scanning. That's just step one! To truly safeguard your organization today, you need unified vulnerability management: find system weaknesses, quickly fix the most important, and defend against future attacks..
Join Kaspersky and BeyondTrust for this informative webinar that addresses the top five security challenges facing IT today - and learn how to protect your organization from insider threats.
Listen in on Oracle and BeyondTrust and learn how virtualization is enabling the cloud and how to keep your company - and its assets - secure amidst both hidden and blatant dangers.
Listen in on this frank discussion about cloud security as Symplified CTO, Darren Platt, and BeyondTrust EVP of Product Operations, Jim Zierick, share their observations on keeping your company and its assets secure amidst hidden and blatant dangers. We’ll show you how it is indeed possible to achieve a corporate environment free from the worry of intentional, accidental, or indirect misuse of privilege.
Learn the basics of network security and tools that you should be leveraging to create and enhance protection for your organization. PowerBroker for Windows, a cutting edge program that helps organizations significantly improve their desktop security by making it easy to remove administrator privileges from users without impacting productivity.
Listen to Catbird and BeyondTrust for this informative on-demand that addresses these new guidelines and gives actionable advice on how to implement the new requirements and stay secure and compliant as you transition to your own virtualized and cloud infrastructure.
In this 60 minute webinar, you will learn how an aerospace and defense company was able to successfully meet multiple security and compliance regulations Retina CS. This organization was challenged with several DoD requirements including security configurations and checks, vulnerability assessment and management, and patching; all of which required constant monitoring and maintenance.
Join BeyondTrust and Dustin Larsen of SM Energy to learn more on Integrated Vulnerability Management and Patching. Hear how Dustin was able to fully-integrate vulnerability scanning with patch management and much more.