“At BeyondTrust, there are three pillars within privileged access management,” he continued. “The first is managing privileged passwords and credentials. The second is related to endpoint least privilege –or the removal of admin rights on endpoints so that malware can’t do anything beyond just running at that endpoint. And the third is privileged remote access, because remote access is generally the number one attack vector.”
Hasson explained that BeyondTrust also believes that helping customers secure their environments in an automated fashion is essential. To this end, they offer an industry-leading vulnerability management tool that customers can use to detect vulnerabilities on endpoints and applications.