Why BeyondTrust?
BeyondTrust is a unique company in the security industry that has created the first and only fusion of Vulnerability and Identity Management (VIM). While the industry has spent over a decade refining the process of vulnerability identification and reporting using standards like OVAL and CVE, BeyondTrust has taken the leadership position in understanding what risk users face when working with potentially vulnerable applications. This concept is only achievable when a solution has the inherent understanding of what a vulnerability is, how it works, and most importantly an active knowledge of what users are doing, with what security permissions, and in real time on an asset.
Consider this example of a recent Zero Day vulnerability, "Internet Explorer CButton Use-After-Free Vulnerability", that was released just before the new year. The description is:
"A use-after-free vulnerability exists in Internet Explorer 6, 7, and 8. This has been seen exploited in the wild in December 2012 in targeted attacks. Successful exploitation allows the attacker to execute arbitrary remote code in the context of the current user."
This vulnerability is only a risk to the current user based on the permissions they are logged in with or credentials used to execute Internet Explorer. Threats like this are easily identifiable with a vulnerability management solution like Retina (and dozens of other vulnerability assessment solutions on the market) but as a best of breed solution fail to consider what the permissions are of the user if this vulnerability was to be exploited.
As an example, consider a system that is vulnerable to this attack. Users that log in to the system with "standard user" permissions are less at risk than a user that logs in with "administrator" privileges since an exploit executes in the context of the current the user. This is the difference between complete system wide control to do anything malicious verses restricted permissions based on a standard user that can generally only operate in the confines of their login. The next question is logical, if everyone is logging into their systems as standard users, is the zero day risk as a great of a threat compared to users that login as administrators? The answer is no. A standard user is less of a risk. Therefore, a potential exclusion or mitigation for your vulnerability report is based on the context of the users executing Internet Explorer within your environment. But what if no one uses Internet Explorer, and you have standardized on another browser like FireFox or Chrome? Yes, the system is technically vulnerable but the offending application is not used and therefore a lower risk even if you login as an administrator. Finally to understand the true meaning of this risk, this vulnerability has been observed in the wild exploiting targets. So, users running as administrators are highly susceptible to drive by attacks verses the standard user. A traditional vulnerability report does not know the difference.
This is why BeyondTrust is different.
The integration of Identity Management and vulnerabilities produces a unique perspective from our solutions. Using tools like PowerBroker for Windows and Retina integrate what applications are executing on a host, what user privileges they are executing with, and what risk they represent using standards like CVSS and if the vulnerability is available in an exploit toolkit or not. Consider the dashboard below available from Retina Insight: