Professional System – BeyondTrust Releases Privileged Remote Access 21.1

– With the new version BeyondTrust wants to speed vendor onboarding, enable secure access to Raspberry Pi, and extend RDP capabilities. The enterprise solution offers the necessary control, management, and audit functionality enabling remote privileged access by authorized employees, contractors, suppliers and vendors, without compromising security or requiring a virtual private network (VPN).

Continue Reading

ZfK – These Microsoft Products Are The Most Vulnerable

– According to a report, the total number of vulnerabilities in Microsoft products reached 1,268 in 2020 - an increase of 181 percent in five years. Which products offer the biggest opportunities for hackers? The numbers are based on BeyondTrust's Microsoft Vulnerabilities Report 2021.

Continue Reading

Le journal du net – 3 Effective Strategies to Enable CISOs to Increase Their Organizational Influence

– In recent years, the role of the CISO has rapidly grown in importance within the Directorates General. This shift is the result of relentless cyber incursions, intense regulatory security, and the undeniable correlation between cyber resilience and long-term business and market performance. Unfortunately, this rapid development also continues to expose the weak points of most cyber executives whose technical skills are often inadequate.

Continue Reading

Forbes – Two Attack Vectors Targeting Technology Companies

– Threat actors are raising the bar, and they have found new low-hanging fruit to attack. If your technology-based products are weak and implemented in businesses and consumers around the world, they may have just found a way to penetrate your business even if all the windows and doors are locked with proverbial hurricane shutters. They found their way in through the supplies and tools you used to keep you safe during a storm. We now have to consider two attacks, our business and the products we make.

Continue Reading

TECHx: A Zero Trust Model for Secure Remote Access

– “A Secure Remote Access solution using a zero-trust architecture can ensure resources are managed from potential inappropriate connection abuse and that all applications are executed within a zero trust model. This means no end users are ever trusted for a remote session unless the confidence for execution can be measured. This is true for any location an asset may reside, irrespective of the perimeter.”

Continue Reading

Arabian Reseller: “For Many CISOs ‘BYOD’ is Just an Unacceptable Risk”

– “The security landscape over the past few months has evolved from protecting against a breach to having the proper procedures, policies, and disclosures for when a breach occurs. The community has come to an understanding that even with the best tools and diligence, a breach can still occur. We have seen this happen even with some of the most secure companies and governments throughout the world.”

Continue Reading

Future Tech: “For Many CISOs ‘BYOD’ is Just an Unacceptable Risk”

– “Organizations can overcome digital security and privacy challenges by ensuring proper separation of duties between the two. There is a common problem in the industry that organizations confuse security and privacy requirements. If these requirements are properly understood, and role delegation and ownership is assigned appropriately, many companies can overcome digital security and privacy challenges despite changes in regional laws and disclosure requirements. Companies must keep them separate and educate team members on the differences and how they complement each other.”

Continue Reading

Mergers & Acquisitions – Clearlake Capital Invests in BeyondTrust

– “BeyondTrust has built an innovative software platform for Privileged Access Management, and we believe that the company is uniquely positioned in the market to continue to experience significant growth in the coming years,” said Behdad Eghbali, co-founder and managing partner, and Prashant Mehrotra, partner, of Clearlake. “We are pleased to join Francisco Partners to support the company as it continues to scale its business and advance its product suite, and we are excited to partner with Matt and the entire BeyondTrust management team to build upon the current momentum to accelerate this next phase of growth.”

Continue Reading

SC Media – Focus-In on the Changing Technologies for Lateral Movement Within SaaS Applications

– Lateral movement no longer runs asset-to-asset and device-to-device. The bad guys can use techniques in the cloud from files, URL’s, and updates to initiate an attack. Organizations must remain mindful of the security of their cloud solutions and most importantly, ensure the identities that have access have the appropriate privileges and permissions to mitigate platforms from being used in an advanced attack.

Continue Reading

LANline – Just-in-Time Access for Cloud Environments

– Leveraging Docker containers for Kubernetes deployments, DevOps Secrets Safe helps IT security personnel and DevOps engineers meet the scalability requirements for highly elastic DevOps environments. It mitigates the risk of a single point of failure with a high-availability microservices-based architecture.

Continue Reading

Arabian Reseller – Attack vectors can come from virtually any angle

– “Organizations can overcome digital security and privacy challenges by ensuring a proper separation of duties between the two. There is a common problem in the industry that organizations confuse security and privacy requirements. If these requirements are properly understood, and role delegation and ownership is assigned appropriately, many companies can overcome digital security and privacy challenges despite changes in regional laws and disclosure requirements. Companies must keep them separate and educate team members on the differences and how they complement each other.”

Continue Reading

The Cyberwire – V3 | Issue 18 | 5.5.21

– Forcepoint has added Matt Dircks, John McCormack, and Dr. John Zangardi to its board of directors. Dircks is CEO of BeyondTrust, McCormack is an Operating Partner at Teleo Capital, and Zangardi is president of Redhorse Corporation.

Continue Reading

Security MEA – Higher the factors, stronger the security

– “Morey Haber, CTO & CISO at BeyondTrust, said “The most critical step organizations should perform when trying to protect their data is to adopt a least privilege strategy for all access to sensitive data and supporting resources. As a part of privileged access management, least privilege ensures that only the appropriate privileges are given to data, systems, applications, and resources, on a need-to-know basis, to prevent excessive privileges from being used to compromise a sensitive resource. This prevents lateral movement and protects against inappropriate access by delegating access to only the owners of data and not employees or machine identities at large.”

Continue Reading

Enterprise Channels MEA – Latest in Exchange server hack, crypto-miners continue to exploit compromised servers

– “With recent attacks infiltrating the supply chain and ransomware now infecting hypervisors without any end-user interaction, businesses must step up their security to thwart modern attacks but at a risk of becoming numb and complacent to the constant onslaught of exploits. Realistically, many security professionals are burning out from the barrage of attacks and never-ending responses. Unfortunately, we now have another exploit to deal with and the damage is devastating.”

Continue Reading

ProMediaNews.de – BeyondTrust Releases Privileged Remote Access 21.1

– With its new version BeyondTrust speeds vendor onboarding, enables secure access to Raspberry Pi, and extends RDP capabilities. The enterprise solution offers the necessary control, management, and audit functionality enabling remote privileged access by authorized employees, contractors, suppliers and vendors, without compromising security or requiring a virtual private network (VPN).

Continue Reading

Informatique News – 4 Good OT Cybersecurity Practices

– In recent years, cyberattacks on critical OT (Operation Technology) infrastructure have literally exploded, with a 2000% increase according to the latest IBM X-Force report! So how do you secure remote access to an organization's network, with a large number of operators, subcontractors and suppliers, without using a VPN, without compromising processes and business continuity, or penalizing productivity?

Continue Reading

CRN – 30 Notable IT Executive Moves: April 2021

– “Jeff’s experience includes a mix of enhancing existing Partner Programs and building new ones. This background is ideal for where BeyondTrust is heading as a company,” said Dee Dee Acquista, BeyondTrust’s senior vice president of Global Channels.

Continue Reading

ChannelPartner – BeyondTrust Updates Privileged Remote Access

– Version 21.1 of Privileged Remote Access brings improved onboarding, secure remote access to Raspberry Pi computers and expanded RDP functions. “Remote access, particularly by third-party vendors, is often the weakest link in network security,” said Dan DeRosa, Chief Product Officer at BeyondTrust.

Continue Reading

Forbes – From Engineer To CTO, Self-Improvement Required

– Whether it is written, oral or public speaking, it does not matter. For success, learn how to communicate all of your thoughts, ideas, ambitions and feelings. While you do so, remember the importance of these nine traits. Once you do, then even something as basic as creative writing to express an aspirational goal will acutely become second nature on your journey to successful leadership.

Continue Reading

LANline – Secure Remote Access without VPN

– Privileged Access Management (PAM) company BeyondTrust released version 21.1 of its remote access solution. Privileged Remote Access offers control, management, and audit remote privileged access functionality by authorized employees, contractors, suppliers and vendors, without compromising security or requiring a virtual private network (VPN).

Continue Reading

CRN – 2021 Women of the Channel: Dee Dee Acquista

– Provide a brief synopsis of your key channel-related accomplishments over the last year. Joined BeyondTrust in March of 2020. Hired to lead our channel strategy globally, I spent my first quarter on a look and listen tour to get a deeper understanding of the business. The plan I formulated was laser focused on assessing the programs, talent, and tools needed for the future

Continue Reading

CRN – The Most Powerful Women of The Channel 2021: Power 100

– Dee Dee Acquista, SVP, Global Channels, BeyondTrust Acquista joined BeyondTrust in March 2020. She was hired to lead the channel strategy globally and spent her first quarter on a look-and-listen tour to get a deeper understanding of the business. The plan she formulated was laser-focused on assessing the programs, talent and tools needed for the future.

Continue Reading

Communications of the ACM – Cyber-Securing the Home Office

– Employees can also mismatch technologies in work-at-home settings. According to Morey Haber, chief technology officer (CTO) and CISO of BeyondTrust, which markets a family of privileged identity management, privileged remote access, and vulnerability management products, the inappropriate application of technologies made for work presents cybersecurity risks in work-from-home environments

Continue Reading

it-daily.net – Security Management: Passwordless Administration

– Cyber-attacks on digital identities aggravate the risk situation in private and business IT environments: Almost every successful cyber-attack is based on the misuse of credentials. Password-free administration allows for IT administration of endpoints without having to use access privileges or administrator rights when logging in.

Continue Reading

Channel Post MEA – We need more women in technology

– “After 16 years in security, I spend a lot of my time focused on cybersecurity. One thing that is clear to me is that there is always the need for innovation. The bad guys are getting smarter and we’ve all got to strive to help protect our assets. As security relates to GTM, I think we will continue to see more and more customers get comfortable with cloud and SaaS.”

Continue Reading

Funkschau – BeyondTrust Expands Password Management

– BeyondTrust Password Safe 21.1 offers support for macOS Secure Token, Cisco Wireless LAN Controller, and Fortinet Admin, plus Privilege Management for Windows & Mac as password test/change agent. Additionally, an extensive set of APIs enables admins to create, read, update, and delete functionality for Team Passwords.

Continue Reading

LANline – IT Management of Privileged Credentials

– Privileged Access Management (PAM) company BeyondTrust released Password Safe 21.1 and BeyondInsight 21.1. In this version, Password Safe supports additional IT platforms, enhances access policy management for keys and API endpoints, and protects shared accounts with “Team Passwords”.

Continue Reading

SearchITChannel – Cloud Consulting Service Attract Investor Dollars

– BeyondTrust, a privileged access management vendor based in Atlanta, expanded its partner program's tier structure to Authorized, Silver, Gold and Platinum. The program provides incremental benefits as partners move up the tiers, according to the company. BeyondTrust also appointed Jeff Mattan as vice president of global partner programs. Mattan was previously senior director of worldwide partner programs, operations, marketing and enablement at KeepTruckin, an IoT provider.

Continue Reading

Enterprise Channels MEA – Latest on malicious cyberattacks on SAP applications and why patch management is critical

– “Considering the age of the vulnerabilities and their associated alerts, this serves as a reminder that even the most critical applications with potential complex deployments must have vulnerability and risk assessments conducted on a regular basis. Then, an organisation must follow up on mitigation and remediation strategies to secure the application.”

Continue Reading

CRN India – BeyondTrust Enhances Partner Program to Boost Partner Value and Success

– “BeyondTrust is committed to offering an exceptional Channel Partner Program, and we continuously re-evaluate program features based on partner input, competitive analysis, and a desire to simplify,” Mattan said. “We’ve revamped the program to be more consistent, fair, and beneficial for our partners and we’re proud that we’ve made it even easier for partners to realize value and customer success with BeyondTrust.”

Continue Reading

Cybersecurity ASEAN – BeyondTrust Enhances Partner Program to Boost Partner Value and Success

– “As a security solutions partner, we look at a client’s holistic cybersecurity programme, not just a single element. BeyondTrust is an important partner because we share that philosophy. We respect their changes to the partner programme and believe it will yield even better results for us as we continue to help clients build cybersecurity programmes aligned with business objectives.” ~ Optiv Chief Technology Officer, Todd Weber

Continue Reading

Security Middle East Magazine – Breach basics

– “While this is another breach added to the list of security incidents in 2021, all companies should take notice – especially those providing IoT services via the web. They should perform proper segmentation, but most importantly learn about the benefits of and implement secure administrative accounts using a privileged access management solution. And if nothing else, they should improve their own security posture and never allow single factor authentication for any privileged account.”

Continue Reading

Pulse 2.0 – Orca Security: $210 Million Series C And $1.2 Billion Valuation

– “In a cloud environment, you’re frequently scaling utilization up and down—possibly thousands of times per hour across multiple clouds—all within a CI/CD pipeline that builds your infrastructure. I tried numerous agent-based tools and they all failed miserably. Orca provides 100% coverage without burdening our DevOps team. It just works.”

Continue Reading

Boan News – Hackers are Well Aware That Privileges Aren’t Working Properly

– Morey Haber, CTO of security company BeyondTrust, points out that "for Windows, there are too many privileges given to you when you perform a default login." "MS is decreasing, but we still need to get rid of more privileges," he added. “That doesn't mean the Macintosh is better. You need to think deeply about the default privileges of the OS. As it is now, the privileges are too high.”

Continue Reading

BeyondTrust Names New Senior Vice President of Sales in APJ

– “I am thrilled to have Nick join our team. He is a seasoned executive with the skill, relationships and talent we need to drive our continued growth in the APJ region,” said Brent Thurrell, Chief Revenue Officer at BeyondTrust. “His vast experience will guide BeyondTrust in our quest to revolutionise our go-to-market strategy, as well as building out our teams in APJ, targeting key growth markets, and becoming the PAM leader in the region.”

Continue Reading

Asia Pacific Security Magazine – BeyondTrust Names New Senior Vice President of Sales in APJ

– “I am thrilled to have Nick join our team. He is a seasoned executive with the skill, relationships and talent we need to drive our continued growth in the APJ region,” said Brent Thurrell, Chief Revenue Officer at BeyondTrust. “His vast experience will guide BeyondTrust in our quest to revolutionise our go-to-market strategy, as well as building out our teams in APJ, targeting key growth markets, and becoming the PAM leader in the region.”

Continue Reading

Solutions Review – The 12 Best Privileged Access Management Vendors of 2021

– BeyondTrust focuses on eliminating insider privilege abuse and increasing application visibility. Its Least Privilege Management and Server Privilege Management solutions offer app-to-app password management capabilities and broad support for PIV-based authentication. Additionally, BeyondTrust was named a Leader in the 2020 Gartner Magic Quadrant for Privileged Access Management.

Continue Reading

Top Places to Work – 2021 AJC Top Places to Work: BeyondTrust

– BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organizations to secure and manage their entire universe of privileges. Our integrated products and platform offer the industry's most advanced PAM solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

Continue Reading

Forbes – Phishing Attacks Within Online Applications

– For end users, there is a lesson to be learned. Threat actors are using the written word, the power of language, social engineering and blended attack vectors (messages and postal mail) to dupe unsuspecting individuals for their financial benefit. Phishing attacks can occur anywhere you are reading text and observing a message.

Continue Reading

Tech.eu – Tel-Aviv/Los Angeles-Based Orca Security Closes $210 Million Series C Round, Reaches Unicorn Status with $1.2 Billion Valuation

– “I’ve been working with vulnerability assessment solutions for over 20 years. I even wrote a book on how to build a vulnerability management strategy. I’ve never seen anything like the Orca Security platform before,” said Morey Haber, CTO and CISO, BeyondTrust. “Within a couple of months I had it fully rolled out, protecting our more than 4,000 cloud customers. This product is a gem and must-have solution for businesses operating in the cloud.”

Continue Reading