Cybersecurity is Not the Same as Photography

Jason Silva, September 26th, 2017

Autumn is here, and I couldn’t be happier. The weather is cool, football is on, and nature is giving us an amazing display of colors. It’s difficult to get a better view of this than from above. We may only be in the early stages but that didn’t stop people from clicking frantically with their cameras, phones, or whatever other device of choice.

This got me thinking… I’ve seen folks take this approach with their cybersecurity strategy and the results are just what you’d expect— it’s mostly out of focus.

A photographer has the luxury of snapping away. Even if one in 20 shots come out nice, deleting your mistakes has no negative impact (yes, that was a pun). Securing your environment is different. It takes planning, teamwork, and the occasional ‘plan b’. A mistake can and has cost millions, and ruin a company’s reputation.

BeyondTrust’s endpoint least privilege management solutions give companies the flexibility to address various cybersecurity needs and the expertise to guide them. But even we can’t do it all — and that’s ok. Just like with photography, sometimes having a few extra lenses is required. In our case, that lens is McAfee ePO.

The integration between BeyondTrust PowerBroker for Windows and McAfee ePolicy Orchestrator (ePO) enables you to protect endpoints and implement least privilege policy across your organization – all through the centralized ePO platform. What’s more, the integration delivers asset vulnerability data and user analytics to help you make informed least privilege decisions.

If you already use ePO you understand the benefits — a bird’s eye view of your systems, a common reporting framework across an otherwise diverse set of products, and a more focused approach to security. Combining best of breed products from McAfee with our patented privileged access management solutions allow you to easily address the most common reasons for a security or data breach:

  • Excessive rights
  • Shared or unmanaged privileged accounts
  • Vulnerable applications

If you are looking for ways to add value to your ePO investment, provide better controls to end points and servers, or properly manage the public profile that is all too often sensitive credentials, contact us to arrange a demonstration with a solution specialist. Let us help you add focus to your security, and a bit of light to your image.