The Cyberwire – V3 | Issue 18 | 5.5.21

– Forcepoint has added Matt Dircks, John McCormack, and Dr. John Zangardi to its board of directors. Dircks is CEO of BeyondTrust, McCormack is an Operating Partner at Teleo Capital, and Zangardi is president of Redhorse Corporation.

Continue Reading

Security MEA – Higher the factors, stronger the security

– “Morey Haber, CTO & CISO at BeyondTrust, said “The most critical step organizations should perform when trying to protect their data is to adopt a least privilege strategy for all access to sensitive data and supporting resources. As a part of privileged access management, least privilege ensures that only the appropriate privileges are given to data, systems, applications, and resources, on a need-to-know basis, to prevent excessive privileges from being used to compromise a sensitive resource. This prevents lateral movement and protects against inappropriate access by delegating access to only the owners of data and not employees or machine identities at large.”

Continue Reading

Enterprise Channels MEA – Latest in Exchange server hack, crypto-miners continue to exploit compromised servers

– “With recent attacks infiltrating the supply chain and ransomware now infecting hypervisors without any end-user interaction, businesses must step up their security to thwart modern attacks but at a risk of becoming numb and complacent to the constant onslaught of exploits. Realistically, many security professionals are burning out from the barrage of attacks and never-ending responses. Unfortunately, we now have another exploit to deal with and the damage is devastating.”

Continue Reading

Informatique News – 4 Good OT Cybersecurity Practices

– In recent years, cyberattacks on critical OT (Operation Technology) infrastructure have literally exploded, with a 2000% increase according to the latest IBM X-Force report! So how do you secure remote access to an organization's network, with a large number of operators, subcontractors and suppliers, without using a VPN, without compromising processes and business continuity, or penalizing productivity?

Continue Reading

CRN – 30 Notable IT Executive Moves: April 2021

– “Jeff’s experience includes a mix of enhancing existing Partner Programs and building new ones. This background is ideal for where BeyondTrust is heading as a company,” said Dee Dee Acquista, BeyondTrust’s senior vice president of Global Channels.

Continue Reading

ChannelPartner – BeyondTrust Updates Privileged Remote Access

– Version 21.1 of Privileged Remote Access brings improved onboarding, secure remote access to Raspberry Pi computers and expanded RDP functions. “Remote access, particularly by third-party vendors, is often the weakest link in network security,” said Dan DeRosa, Chief Product Officer at BeyondTrust.

Continue Reading

Forbes – From Engineer To CTO, Self-Improvement Required

– Whether it is written, oral or public speaking, it does not matter. For success, learn how to communicate all of your thoughts, ideas, ambitions and feelings. While you do so, remember the importance of these nine traits. Once you do, then even something as basic as creative writing to express an aspirational goal will acutely become second nature on your journey to successful leadership.

Continue Reading

LANline – Secure Remote Access without VPN

– Privileged Access Management (PAM) company BeyondTrust released version 21.1 of its remote access solution. Privileged Remote Access offers control, management, and audit remote privileged access functionality by authorized employees, contractors, suppliers and vendors, without compromising security or requiring a virtual private network (VPN).

Continue Reading

CRN – 2021 Women of the Channel: Dee Dee Acquista

– Provide a brief synopsis of your key channel-related accomplishments over the last year. Joined BeyondTrust in March of 2020. Hired to lead our channel strategy globally, I spent my first quarter on a look and listen tour to get a deeper understanding of the business. The plan I formulated was laser focused on assessing the programs, talent, and tools needed for the future

Continue Reading

CRN – The Most Powerful Women of The Channel 2021: Power 100

– Dee Dee Acquista, SVP, Global Channels, BeyondTrust Acquista joined BeyondTrust in March 2020. She was hired to lead the channel strategy globally and spent her first quarter on a look-and-listen tour to get a deeper understanding of the business. The plan she formulated was laser-focused on assessing the programs, talent and tools needed for the future.

Continue Reading

Communications of the ACM – Cyber-Securing the Home Office

– Employees can also mismatch technologies in work-at-home settings. According to Morey Haber, chief technology officer (CTO) and CISO of BeyondTrust, which markets a family of privileged identity management, privileged remote access, and vulnerability management products, the inappropriate application of technologies made for work presents cybersecurity risks in work-from-home environments

Continue Reading

it-daily.net – Security Management: Passwordless Administration

– Cyber-attacks on digital identities aggravate the risk situation in private and business IT environments: Almost every successful cyber-attack is based on the misuse of credentials. Password-free administration allows for IT administration of endpoints without having to use access privileges or administrator rights when logging in.

Continue Reading

Channel Post MEA – We need more women in technology

– “After 16 years in security, I spend a lot of my time focused on cybersecurity. One thing that is clear to me is that there is always the need for innovation. The bad guys are getting smarter and we’ve all got to strive to help protect our assets. As security relates to GTM, I think we will continue to see more and more customers get comfortable with cloud and SaaS.”

Continue Reading

Funkschau – BeyondTrust Expands Password Management

– BeyondTrust Password Safe 21.1 offers support for macOS Secure Token, Cisco Wireless LAN Controller, and Fortinet Admin, plus Privilege Management for Windows & Mac as password test/change agent. Additionally, an extensive set of APIs enables admins to create, read, update, and delete functionality for Team Passwords.

Continue Reading

LANline – IT Management of Privileged Credentials

– Privileged Access Management (PAM) company BeyondTrust released Password Safe 21.1 and BeyondInsight 21.1. In this version, Password Safe supports additional IT platforms, enhances access policy management for keys and API endpoints, and protects shared accounts with “Team Passwords”.

Continue Reading

SearchITChannel – Cloud Consulting Service Attract Investor Dollars

– BeyondTrust, a privileged access management vendor based in Atlanta, expanded its partner program's tier structure to Authorized, Silver, Gold and Platinum. The program provides incremental benefits as partners move up the tiers, according to the company. BeyondTrust also appointed Jeff Mattan as vice president of global partner programs. Mattan was previously senior director of worldwide partner programs, operations, marketing and enablement at KeepTruckin, an IoT provider.

Continue Reading

Enterprise Channels MEA – Latest on malicious cyberattacks on SAP applications and why patch management is critical

– “Considering the age of the vulnerabilities and their associated alerts, this serves as a reminder that even the most critical applications with potential complex deployments must have vulnerability and risk assessments conducted on a regular basis. Then, an organisation must follow up on mitigation and remediation strategies to secure the application.”

Continue Reading

CRN India – BeyondTrust Enhances Partner Program to Boost Partner Value and Success

– “BeyondTrust is committed to offering an exceptional Channel Partner Program, and we continuously re-evaluate program features based on partner input, competitive analysis, and a desire to simplify,” Mattan said. “We’ve revamped the program to be more consistent, fair, and beneficial for our partners and we’re proud that we’ve made it even easier for partners to realize value and customer success with BeyondTrust.”

Continue Reading

Cybersecurity ASEAN – BeyondTrust Enhances Partner Program to Boost Partner Value and Success

– “As a security solutions partner, we look at a client’s holistic cybersecurity programme, not just a single element. BeyondTrust is an important partner because we share that philosophy. We respect their changes to the partner programme and believe it will yield even better results for us as we continue to help clients build cybersecurity programmes aligned with business objectives.” ~ Optiv Chief Technology Officer, Todd Weber

Continue Reading

Security Middle East Magazine – Breach basics

– “While this is another breach added to the list of security incidents in 2021, all companies should take notice – especially those providing IoT services via the web. They should perform proper segmentation, but most importantly learn about the benefits of and implement secure administrative accounts using a privileged access management solution. And if nothing else, they should improve their own security posture and never allow single factor authentication for any privileged account.”

Continue Reading

Pulse 2.0 – Orca Security: $210 Million Series C And $1.2 Billion Valuation

– “In a cloud environment, you’re frequently scaling utilization up and down—possibly thousands of times per hour across multiple clouds—all within a CI/CD pipeline that builds your infrastructure. I tried numerous agent-based tools and they all failed miserably. Orca provides 100% coverage without burdening our DevOps team. It just works.”

Continue Reading

Boan News – Hackers are Well Aware That Privileges Aren’t Working Properly

– Morey Haber, CTO of security company BeyondTrust, points out that "for Windows, there are too many privileges given to you when you perform a default login." "MS is decreasing, but we still need to get rid of more privileges," he added. “That doesn't mean the Macintosh is better. You need to think deeply about the default privileges of the OS. As it is now, the privileges are too high.”

Continue Reading

BeyondTrust Names New Senior Vice President of Sales in APJ

– “I am thrilled to have Nick join our team. He is a seasoned executive with the skill, relationships and talent we need to drive our continued growth in the APJ region,” said Brent Thurrell, Chief Revenue Officer at BeyondTrust. “His vast experience will guide BeyondTrust in our quest to revolutionise our go-to-market strategy, as well as building out our teams in APJ, targeting key growth markets, and becoming the PAM leader in the region.”

Continue Reading

Asia Pacific Security Magazine – BeyondTrust Names New Senior Vice President of Sales in APJ

– “I am thrilled to have Nick join our team. He is a seasoned executive with the skill, relationships and talent we need to drive our continued growth in the APJ region,” said Brent Thurrell, Chief Revenue Officer at BeyondTrust. “His vast experience will guide BeyondTrust in our quest to revolutionise our go-to-market strategy, as well as building out our teams in APJ, targeting key growth markets, and becoming the PAM leader in the region.”

Continue Reading

Solutions Review – The 12 Best Privileged Access Management Vendors of 2021

– BeyondTrust focuses on eliminating insider privilege abuse and increasing application visibility. Its Least Privilege Management and Server Privilege Management solutions offer app-to-app password management capabilities and broad support for PIV-based authentication. Additionally, BeyondTrust was named a Leader in the 2020 Gartner Magic Quadrant for Privileged Access Management.

Continue Reading

Top Places to Work – 2021 AJC Top Places to Work: BeyondTrust

– BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organizations to secure and manage their entire universe of privileges. Our integrated products and platform offer the industry's most advanced PAM solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

Continue Reading

Forbes – Phishing Attacks Within Online Applications

– For end users, there is a lesson to be learned. Threat actors are using the written word, the power of language, social engineering and blended attack vectors (messages and postal mail) to dupe unsuspecting individuals for their financial benefit. Phishing attacks can occur anywhere you are reading text and observing a message.

Continue Reading

Tech.eu – Tel-Aviv/Los Angeles-Based Orca Security Closes $210 Million Series C Round, Reaches Unicorn Status with $1.2 Billion Valuation

– “I’ve been working with vulnerability assessment solutions for over 20 years. I even wrote a book on how to build a vulnerability management strategy. I’ve never seen anything like the Orca Security platform before,” said Morey Haber, CTO and CISO, BeyondTrust. “Within a couple of months I had it fully rolled out, protecting our more than 4,000 cloud customers. This product is a gem and must-have solution for businesses operating in the cloud.”

Continue Reading

CXO Insight ME – Trust no one

– Zero trust is a high-end goal that will become the new normal for cybersecurity. That being said, realistically, the successful zero trust implementations that have gone from marketing to reality are ones that have had zero trust designed from day one. Typically, this is not something everyone can do unless they are embarking on a brand-new initiative.

Continue Reading

Inside Security – Security Trends

– More than 1,200 vulnerabilities were discovered in Microsoft products in 2020, a 48% year-over-year jump, according to the latest stats from security firm BeyondTrust. Elevation of privileges surpassed remote code execution as the top vulnerability category last year, accounting for 44% of total bugs

Continue Reading

Swiss IT Magazine – 48 Percent More Microsoft Security Vulnerabilities

– According to a study, the number of security-relevant vulnerabilities in Microsoft products rose to a new high last year, and was 48 percent above the previous year's figure. IT company BeyondTrust, that operates in the area of Privileged Access Management, has published this year's edition of the Microsoft Vulnerabilities Report.

Continue Reading