- PowerBroker Password Safe – Complete management of passwords including workflow, session recording, API access, and analytics
- PowerBroker for Unix & Linux – Command elevation and delegation for Unix and Linux systems
- PowerBroker for Windows – Least privilege and application control with patented technology for Microsoft Windows desktops and servers
- PowerBroker for Mac – Least privilege application management for Mac OS
- Retina CS – Vulnerability assessment, regulatory reporting, and remediation
Announcement Further Enhances Cloud StrategyWhile this announcement represents a new offering for BeyondTrust and our platform (currently also available as software, virtual and physical appliances), it significantly enhances our strategy in the cloud by providing the necessary resources to manage cloud instances, cloud services, and cloud applications. Further, it enhances our offering for Managed Services Providers (MSPs) looking to deliver new security services for their customers. This means that customers and partners alike can use our industry-unique cloud connectors for managing other cloud instances and passwords, and not only for Google. Cloud platform support includes: Why does this announcement matters to our customers? For any business – large or small – considering moving to the cloud, avoiding more on premise technology, or trying to manage a vast number of roaming laptops or remote employees, this offering is for you. By enabling BeyondTrust’s privileged access management and vulnerability management solutions in the cloud, we can meet objectives for a rapid deployment, secure access, and a cost-effective solution to eliminate the threats of excessive privileged access. And, frankly, our customers should expect this type of innovation from the overall Leader in the 2016 Forrester Privileged Identity Management Wave. For further validation of our cloud strategy, be sure to read the analyst report, Ovum On the Record: BeyondTrust Cloud Enables Privilege and Vulnerability Management. For direct access to the BeyondInsight image, please visit the Google Cloud Marketplace. To obtain new licenses for your Google instance, please contact BeyondTrust Sales. We’re thrilled to be the first PAM provider with solutions in the Google Cloud, and hope you are too! Watch for more cloud-based innovation coming soon.
Morey J. Haber, Chief Technology Officer and Chief Information Security Officer at BeyondTrust
Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.