Mapping BeyondTrust Solutions to ISO 27002
About this White Paper
The International Organization for Standardization (ISO) has established guidelines and general principles for initiating, implementing, maintaining and improving information security management across an organization. BeyondTrust has prepared this guide so that IT and security administrators can quickly understand how BeyondTrust solutions for privileged access management (PAM) and vulnerability management (VM) map into the ISO 27002 requirements. This guide provides:
- A brief introduction to ISO 27002
- A table with a summary mapping of BeyondTrust solutions to ISO 27002
- A table with a detailed mapping of BeyondTrust solutions to ISO 27002
- An overview of BeyondTrust PAM and VM solutions
Download the guide now to learn how BeyondTrust solutions can help improve your security around privileged accounts / access and vulnerabilities, and simplify your path to ISO 27002 compliance.