BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    Use Cases and Industries
    See All Products
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

PowerBroker for Windows 7.4 and PowerBroker for Mac 1.4 Help Organizations Maintain Visibility and Control

March 27, 2018

  • Blog
  • Archive
The latest releases of BeyondTrust PowerBroker for Windows and PowerBroker for Mac feature several exciting enhancements around user behavior monitoring, user-based rules and policy, and third-party integration, giving users unmatched visibility and control over physical and virtual desktops and servers. Here are some highlights of the new features.

PowerBroker for Windows 7.4

User Behavior and Lateral Movement Tracking News of data breaches, advanced persistent threats, and large-scale hacks remain a constant reminder that no organization is completely safe from cyber-attacks. A common theme of recent attacks is lateral movement – where attackers gain access to a machine within an organization and attempt to move through the network, ultimately gaining access to sensitive data and/or critical systems. Combatting these attacks can be challenging. PowerBroker for Windows version 7.4 provides assistance in the detection and prevention of user behavior related to these activities. With PowerBroker for Windows version 7.4, IT admins can leverage rules to identify activities related to suspicious lateral movement. PowerBroker for Windows version 7.4 allows administrators to create rules which can monitor common attack vectors targeted during lateral movement attacks. Lateral Movement Report Lateral Movement Report Enhanced Logging to Support Integration with PowerBroker Password Safe PowerBroker for Windows, in unison with PowerBroker Password safe allows companies to securely launch an application as an alternate user in place of the default action of a PBW rule without exposing privileged credentials. This integration also acts as a password change agent for Password Safe in the event that a network-based password cycle fails, most often a result of lack of connectivity. PowerBroker for Windows version 7.4 provides additional logging of these activities to provide a better audit and compliance trail. With PowerBroker for Windows version 7.4, events like a Password change are written to the event log. Enhanced Compatibility with Third-Party Security Software Security software is an ever-changing landscape, with new solutions reaching the market. In order to future-proof your security portfolio investment, PowerBroker for Windows is designed to complement your security portfolio— for what you have now, as well as plan for in the future. PowerBroker for Windows version 7.4 has further enhanced its third-party security software compatibility settings.

PowerBroker for Mac 1.4 Highlights

MacOS High Sierra Support (10.13.x) PowerBroker for Mac now offers support for MacOS High Sierra (10.13x). This provides parity functionality with previously supported versions of the OS and enables organizations to confidently and securely adopt the latest OS version without the risk of excessive user privileges. Improve Security with User-based Rules and Policy Central Policy, also referred to as BeyondInsight or Web Services Mode, enables customers to manage their PowerBroker for Mac rule set. Until now this mode only allowed for targeting assets/computers. By following and targeting policy to a user, [in addition to machine-based policy], on whatever PBMac managed device they log into, companies can better ensure a consistent security model and user experience throughout their networks. Stacking Policies Add Granularity to Policy via Web Services Many organizations require greater granularity of access policy than what typical web services can provide. For example, every user in Company can perform a basic set of actions, but for a select group of computers in the Company, there should be a special set of policies applicable only to them. If they choose to use web services instead of Group Policy for policy management, the Company should have the same capability available to them and not be limited by a single policy set. PowerBroker for Mac version 1.4.0 adds greater granularity to policy management delivered through web services with new stacking policies. For a complete demonstration of these new features and even more enhancements not mentioned here, read the PowerBroker for Windows and PowerBroker for Mac new features documents. And if you have any questions or would like a personalized demo, contact us today.
Photograph of Jason Silva

Jason Silva, Sr. Solutions Engineer, BeyondTrust

Jason Silva brings over 25 years of solutions and management experience to the industry. Currently serving as Senior Solutions Engineer for BeyondTrusts' Universal Privilege Management Platform, he uses this knowledge to help customers realize the value of our solutions throughout the product lifecycle. Earlier in his career, he found success as a software developer in a global consulting company and spent over four years managing IT and Regulatory Compliance in the banking industry.

Specialties: Microsoft Active Directory, Microsoft Group Policy, Pre and Post Sales Training, Sales Engineering, Enterprise Security Tools, Privileged Access Management

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Solutions to the Identity, Credential, and Access Management (ICAM) Architecture

Whitepapers

Four Key Ways Governments Can Prepare for the Growing Ransomware Threat

Whitepapers

The Operational Technology (OT) Remote Access Challenge

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.