We are pleased to announce the availability of PowerBroker for Mac 1.5. PowerBroker for Mac reduces the risk of privilege misuse by enabling standard users on Mac OS to perform administrative tasks successfully without entering elevated credentials. With PowerBroker for Mac, IT organizations simplify the enforcement of least-privilege policies, close security gaps, improve operational efficiency, and achieve compliance objectives faster by removing administrator rights from MacOS users.
PowerBroker for Mac 1.5 expands on its market-leading capabilities by introducing the following new feature.
Improve Security with Identity-Based Management of Policy
Identity-based policy enables customers to apply PowerBroker for Mac policies to individuals, users, or groups based on affiliation. By following and targeting policy based on identity, companies can better ensure a consistent security model and user experience throughout their networks. With PowerBroker for Mac version 1.5, users can now manage access policy by a variety of parameters, including: security group, username, computer name, IP Range, and user type (Admin/Domain/Local).
The end result allows information technology administrators to target rules for privileged elevation based on affiliation to enterprise authentication directories and location. If you consider most MacOS devices are mobile, administrators can allow some applications to elevate within the corporate environment and deny others while the devices are roaming. This granularity by identity and device context addresses the threats of running applications as an administrator outside of the corporate perimeter.
For more information on PowerBroker for Mac, get the What's New document or contact us today.
Morey J. Haber, Chief Security Advisor
Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.