Retina CS vulnerability management interface2014: Bridging Vulnerability Management and Privileged Account Management Fast-forward to January 2014, when BeyondTrust released the BeyondInsight IT Risk Management platform, built on Retina CS technology. Why? It was clear that, in addition to reducing external risk to infrastructure, Retina CS could mitigate internal, user-based risk by incorporating privileged account management data. This concept merges asset risk management with least-privilege access monitoring on Windows, UNIX, Linux, and OS X devices. A new revolution is being waged. Imagine knowing all the risks about an asset and how users are interacting with those assets. BeyondInsight can do that – Today!
Windows endpoint risk analysis within the BeyondInsight platformThe Future of IT Risk Management Another generation is in beta: All user accounts discovered and reported in BeyondInsight can now be managed with native PowerBroker Password Safe technology. This evolution enables a complete IT risk management workflow for assets and users. BeyondInsight customers can now not only uncovered asset risk, but also control user access via least privilege management and password vaulting for accounts, services and local access. Using a single platform for all these functions has huge implications for vendor consolidation, cost reduction and training efficiency – let alone risk mitigation.
Password vaulting within the BeyondInsight platformBeyondTrust is leading the way among security management platforms, not by just adding features, but by rethinking how teams manage modern threats and security. Security solutions have evolved. Welcome to the revolution! > Learn more about the BeyondInsight IT Risk Management Platform > Learn more about PowerBroker Password Safe > White paper: Fusing Vulnerability Data and User Intelligence
Morey J. Haber, Chief Technology Officer and Chief Information Security Officer at BeyondTrust
Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.