Intelligent CISO Issue 04 | Page 69

BeyondTrust introduces new ways to help IT security teams manage access policy efficiently BeyondTrust, a leading cybersecurity company dedicated to preventing privilege misuse and stopping unauthorised access, has announced two new features in PowerBroker for Windows that help IT administrators manage privileged access by automating their security policies. with PowerBroker Password Safe, companies can validate whether a script has been tampered with before it is granted authorisation for password or application use. This enhancement not only helps administrators and users, but also helps next-generation initiatives for DevOps automate Windows environments embarking on digital transformation journeys. B With an increase in stolen credentials as the cause of many of today’s data breaches and hacking attacks, according to the Verizon 2018 Data Breach Investigations Report, organisations must remain vigilant in their execution of security policies across the enterprise. Considering the sheer volume of potential endpoints an organisation must manage when implementing least privilege rules and the complexities associated with developing rules based on users’ needs and privileged elevation requirements, an automated solution speeds the time to value and reduces the risk of inconsistent or incomplete policies. Additionally, PowerBroker for Windows version 7.5 includes enhanced protections against rogue scripts by allowing only those with an approved signature and other specified criteria www.intelligentciso.com | Issue 04 Morey Haber, CTO, BeyondTrust With the latest version of PowerBroker for Windows, IT administrators can achieve the following: This compatibility update demonstrates BeyondTrust’s commitment to staying in lockstep with the Microsoft community. ▯ ▯ Reduced attack surfaces: Decrease attack surfaces by removing admin rights from end users and employing fine-grained policy controls for all privileged access ▯ ▯ Continuous monitoring: Monitor and audit sessions for unauthorised access and/or changes to files, directories and lateral movement ▯ ▯ Analyse behaviour: Detect suspicious users, accounts and asset activities through behaviour analysis and vulnerability-based application management (VBAM) to run. This capability is essential for scripts that manage configurations or provide privileged access to resources. “Discovering, creating and testing least privilege policies can be a challenge for many of today’s enterprises,” said Morey Haber, CTO, BeyondTrust. “IT teams are often tasked with evaluating multiple systems and understanding a wide array Combined with application-to- application scripts like those used 69 PowerBroker Policy Accelerator, a new and revolutionary capability of the PowerBroker for Windows solution, intelligently identifies new applications and privilege elevation requirements based on real activities in the network and user event logs and subsequently automates the process of defining and generating the necessary policy rules. PowerBroker for Windows version 7.5 now also supports Microsoft Windows Update of April 10, allowing IT admins to remain up to date on the latest Windows OS. This compatibility update demonstrates BeyondTrust’s commitment to staying in lockstep with the Microsoft community.