We are pleased to announce the availability of PowerBroker for Mac 1.5. PowerBroker for Mac reduces the risk of privilege misuse by enabling standard users on Mac OS to perform administrative tasks successfully without entering elevated credentials. With PowerBroker for Mac, IT organizations simplify the enforcement of least-privilege policies, close security gaps, improve operational efficiency, and achieve compliance objectives faster by removing administrator rights from MacOS users.
PowerBroker for Mac 1.5 expands on its market-leading capabilities by introducing the following new feature.
Improve Security with Identity-Based Management of Policy
Identity-based policy enables customers to apply PowerBroker for Mac policies to individuals, users, or groups based on affiliation. By following and targeting policy based on identity, companies can better ensure a consistent security model and user experience throughout their networks. With PowerBroker for Mac version 1.5, users can now manage access policy by a variety of parameters, including: security group, username, computer name, IP Range, and user type (Admin/Domain/Local).
The end result allows information technology administrators to target rules for privileged elevation based on affiliation to enterprise authentication directories and location. If you consider most MacOS devices are mobile, administrators can allow some applications to elevate within the corporate environment and deny others while the devices are roaming. This granularity by identity and device context addresses the threats of running applications as an administrator outside of the corporate perimeter.
For more information on PowerBroker for Mac, get the What's New document or contact us today.

Morey J. Haber, Chief Technology Officer and Chief Information Security Officer at BeyondTrust
Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.