Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Symantec Shows (again) Why it's Important to Build a Layered Security Strategy

June 29, 2016

  • Blog
  • Archive
Layered Security As we saw in today’s announcement about the numerous flaws in Symantec and Norton products that allow vulnerabilities, exploits that can be run across your IT environment in a privileged context could cause extreme havoc. This is a great thing to think through as you are protecting your organization against possible security risks. In this event, we have to consider how to quickly protect endpoints. You certainly need to update servers exposed to the internet for your mobile workforce because when speed is of essence, you cannot wait for users to come into the office. You also do not want to wait for your management agent to be online so you can push a software update. Automatic updates where your users will automatically download the software from an edge gateway is an awesome strategy that just requires an internet connection. Layering additional security controls also helps to mitigate risk of a single exposure in your environment that has a wide deployment. In this case, anti-virus software – which is probably installed in 500 of the Fortune 500, and is likely part of your protection toolkit against malicious threats – is a threat angle itself. In my view, having anti-virus software is just one of the tools in your layered security strategy. Looking at ways to protect yourself from this type of threat, you have many different strategies to consider:
  • Email security – remove the risk of these threats being impactful as soon as a signature is available.
  • Web security – remove the risk of these threats as sites are classified and as soon as signatures are available.
  • Advanced firewall – block outbound traffic, inbound patterns, or other signatures from application aware firewalls.
  • Least privilege – remove the rights of applications and users to install/update system files because they will have not come from a trusted source.
  • Integrity monitoring – block or notice changes to critical files that could indicate a compromised system.
Layering all of these in the most risk averse companies is usually what I see. But, if you need to immediately remove risk, especially if you have to touch every endpoint, a layered strategy will be a great help. If you would like to learn more on how BeyondTrust can help reduce risks on endpoints, contact us today.

Scott Carlson

Technical Fellow

As Technical Fellow, Scott Carlson brings internal technical leadership to BeyondTrust, strategic guidance to our customers, and evangelism to the broader IT security community. He also plays a key role in developing innovative relationships between BeyondTrust and its technical alliance partners. Scott has over 20 years of experience in the banking, education and payment sectors, where his focus areas have included information security, data centers, cloud, virtualization, and systems architecture. He is also a noted thought leader, speaker and contributor to RSA Conference, OpenStack Foundation, Information Week and other industry institutions.

Prior to joining BeyondTrust, Scott served as Director of Information Security Strategy & Integration with PayPal, where he created and executed security strategy for infrastructure across all PayPal properties, including worldwide data centers, office networks, and public cloud deployments. He led several cross-departmental teams to deliver information security strategy, technical architecture, and strategic solutions across enterprise IT environments. As a member of the office of the CISO, CTO and CIO, Scott spoke on behalf of the company at global conferences. In addition, he was responsible for infrastructure budget management, vendor management, and product selection, while also serving as the cloud security strategist for private OpenStack cloud and public cloud (AWS, GCP, Azure). Prior to PayPal, Scott held similar roles with Apollo Education Group and Charles Schwab.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.