Managing User Access for Both Privileged and Non-Privileged Accounts with BeyondTrust and SailPoint

by Kevin Franks  | 

Conventional identity management deals primarily with user accounts associated with personal logins. Most organizations utilize these products to provision and de-provision users. But these same organizations don’t always think about privileged logins. That’s where PAM comes in. It covers the privileged identities that grant elevated access throughout an enterprise. A new technology integration between BeyondTrust PasswordSafe and SailPoint IdentityIQ gives organizations the visibility and centralized control they need to govern access for both privileged and non-privileged accounts.

BeyondTrust and OneLogin - Together in Service of a Higher Security

by Benjamin H. Sherman  | 

​Most organizations are still hybrid cloud adopters. They’ve achieved a level of virtualization, but have yet to fully liberate themselves from the OS/server and network hardware access controls that break applications when security measures are introduced. In the meantime, unsanctioned SaaS and PaaS cloud projects proliferate as teams try to keep up with increasing productivity demands in the midst of delayed, or slow, company-wide technology deployments. On top of that, convincing a root administrator they should give up direct/backdoor access to systems in the name of security is always a challenge. Here are three strategies to secure your hybrid IT infrastructure for least privilege access while simultaneously boosting productivity. Each relies on unifying IDaaS (Identity as a Service) authentication with PAM (Privileged Access Management) controls to give all employees a better way to interact with their infrastructure and SaaS applications.

April 2019 Patch Tuesday

by BeyondTrust Research  | 

Patch Tuesday April 2019 includes patches for 70 vulnerabilities, including two which were actively being exploited in the wild. Both vulnerabilities are elevation of privilege vulnerabilities in win32k, allowing an unprivileged user to run arbitrary code in kernel mode. Other critical vulnerabilities resided in Microsoft’s browsers and in Office, allowing for remote code execution. Learn more.