– BeyondTrust, the worldwide leader in Privileged Access Management (PAM), today announced record Q1 results, building upon the company’s PAM leadership and base of 20,000 customers with new product innovations, cloud expansion, and industry-leading customer satisfaction
– BeyondTrust, the worldwide leader in Privileged Access Management (PAM), today announced it’s extending the availability of its free 90-Day evaluation for organizations seeking solutions to enable Secure Remote Access for remote workers during the COVID-19 pandemic.
– "Daily thousands of customers around the world are using our remote access protection solutions to support remote workforce and external vendors,” said Matt Dircks, CEO of BeyondTrust. "We are doing our best to help you cope."
– In its latest Microsoft Vulnerabilities Report 2020, security firm BeyondTrust shows that 77 percent of critical Microsoft security vulnerabilities could be mitigated by the removal of admin rights. Last year, 77 percent of critical vulnerabilities in Microsoft's operating systems and applications would have been manageable by removing administration rights, according to BeyondTrust.
– "If you're posting your photo from a yearbook or something else without a caption or any personal identifiable information it's honestly perfectly fine," says Morey Haber, Chief Technical Officer of the cybersecurity firm Beyond Trust.
– Morey Haber contributed article By merging software development and IT operations ― two traditionally mutually exclusive functions ― DevOps has fundamentally transformed how today’s organizations develop, operate and maintain applications across their environment.
– Many PAM tools lack the ability to extend granular privileged access controls to non-traditional endpoints, such as medical or industrial-connected devices and control systems. Organisations need a solution that delivers the capability of least privilege to those endpoints by allowing fine-grained control over the commands sent and the responses received over SSH sessions.
– "If you're posting your photo from a yearbook or something else without a caption or any personal identifiable information it's honestly perfectly fine," said Morey Haber, chief technical officer of the cybersecurity firm Beyond Trust.
– In haste, many organizations may have remote workers and vendors VPN into the corporate network, but VPNs are not ideal. First, they lack the scalability needed to accommodate a surge of remote workers. And, perhaps more concerning, is that the VPN technology, while providing some protections (such as against man-in-the-middle attacks), itself suffers many security shortcomings.