Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Ask Why? BeyondSaaS will tell you.

November 20, 2013

  • Blog
  • Archive
Encouraging team members to “ask why” is a great way to encourage creativity, solve problems, and understand why things are being done, the way they are being done. Changes and best practices for proactive security are a great reason to empower team members with this philosophy. If changes are required, and the team does not understand why something needs to be changed or is at risk, you should encourage them to ask why. Many times, when securing your digital assets on the internet, people forget to ask why something should be patched or configured in order to minimize a risk. A simple port being left open, allowing an ICMP response, or even not securing your web server can lead to an unnecessary and costly risk. Allowing and encouraging teams to ask why is a simple way to make sure these assets are secured and people know why these changes are so important. As a part of this philosophy, verification of the changes ensures that the question has been answered, the changes were correctly made, and the risk is no longer present or has been properly mitigated. Today, BeyondTrust has a solution to help answer “why". BeyondSaaS is a new cloud based vulnerability assessment solution for external assets powered by the Retina scan engine. It provides a true zero deployment technology for assessing internet facing assets for vulnerabilities, PCI compliance, and industry leading web application assessments. The results provide comprehensive details as to why a vulnerability is a risk and prescriptive guidance on how to properly remediate the vulnerability. Lets take a deeper dive into BeyondSaaS and how it can empower users to ask “why”. After your account has been created by a BeyondSaaS administrator, a user chooses whether they want to perform a web application scan or a vulnerability assessment:

BeyondSaas-img1

Then, all they need to do is enter targeting addresses or host names, and schedule the scan; it is that simple:

BeyondSaas-img2

When the assessment is done, a comprehensive report is available that truly answers “why" I am at risk:

BeyondSaas-img3

BeyondSaaS is the next generation of cloud based vulnerability assessment solutions from one the first vulnerability scan engines on the market. It is a modern application that can be managed from almost every web browser, tablet, and smart phone without a dedicated app. It was designed to be effective, affordable, and provides reliable results based on a scan engine trusted by over 10,000 organizations for over 15 years. BeyondTrust believes that protecting your internet facing assets should be as simple as a few mouse clicks and we are confident you will feel the same way. For more information on BeyondSaaS, or to sign up for your free trial, please click here.

Morey J. Haber, Chief Technology Officer and Chief Information Security Officer at BeyondTrust

Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

A Zero Trust Approach to Secure Access

Webcasts

Rising CISOs: Ransomware, Cyber Extortion, Cloud Compromise, oh my!

Whitepapers

A Zero Trust Approach to Windows & Mac Endpoint Security

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.