Integration with ServiceNow Improves Automation and Application Exception Handling
BeyondTrust, the worldwide leader in Privileged Access Management, today announced Defendpoint 5.3 with Power Rules to help speed decisions on whether to allow an application to run, or allow it to run with admin rights, by automating the integration of third-party intelligence sources. The first example of Power Rules integration is with ServiceNow to automatically submit an IT ticket to the IT team, so that they can make an informed and expedited decision on the user’s request to run an application, installation, script or task.
Power Rules is a business rules engine that enables customers to more easily configure Defendpoint to their unique business requirements as well as integrate Defendpoint into other systems.
Whitelisting and blacklisting rules are generally straightforward to develop and enforce, but applications where there is only limited information available can introduce risk into an environment if not properly vetted prior to allowing the application’s use.
Based on PowerShell, organizations can simply write a script and embed it in the policy itself. For example, Power Rules can trigger a service desk workflow to automatically submit a ticket, call out to a third-party to check the hash, or interface with a vulnerability management system to check for CVEs on the application.
“This enhancement further demonstrates BeyondTrust leadership in endpoint privilege management,” said Dan DeRosa, Chief Product Officer at BeyondTrust. “Defendpoint 5.3 enables organizations to reduce risk and drive greater ROI from their existing IT investments by leveraging inputs from third-party systems to help inform privilege elevation decisions.”
Power Rules for ServiceNow
With the latest version of Defendpoint, IT administrators can achieve the following:
Defendpoint 5.3 with Power Rules is available now.
BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments.
The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organizations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. We are trusted by 20,000 customers, including 70 percent of the Fortune 500, and a global partner network. Learn more at www.beyondtrust.com.
Follow BeyondTrust:
Twitter: https://twitter.com/beyondtrust
Blog: www.beyondtrust.com/blog
LinkedIn: https://www.linkedin.com/company/beyondtrust
Facebook: https://www.facebook.com/beyondtrust
###
For BeyondTrust:
Mike Bradshaw Connect Marketing for BeyondTrust P: (801) 373-7888 E: mikeb@connectmarketing.com