COVER STORY
The BeyondTrust
solution is an all-
encompassing, one-
stop solution for a
lot of the necessary
security activities
that we have to do on
a day-to-day basis.
Here, Kennedy provides further insight
into the cyberthreats faced by the
business and how BeyondTrust is helping
to mitigate against them. What were the main requirements
for you when you were looking
for a vendor for privileged access
management solutions?
What unique cybersecurity
challenges does the
business face? A lot of security products will promise
you that they can do everything and
not a lot of them actually deliver so it’s
really around the ease of use and the
integrity of the solution – making sure
it’s kept up-to-date with the relevant
technologies and also that it’s easy to
deploy and manage.
I don’t suppose they are relatively unique,
however we are entrusted by our clients
to look after a very important part of their
business so we have to make sure that
the availability of our systems is absolute,
as well as the financial processes that
enable their business to run smoothly.
If we don’t get the cash flows to our
customers there’s a real chance that will
significantly affect their business.
52
a large number of technologies to just a
few and then the technical teams really
take over and start to utilise that platform
and see how effective it is in our
particular environment. They’ll see how
easy it is, given the knowledge within our
teams, to be able to use it.
Just because a product is the best
doesn’t mean your team can use it right?
So it’s a balance between usability and
how effective it is as a tool.
How did you go about choosing
the best solution? What was it about
BeyondTrust’s product that
you found so appealing?
We start with the requirements and then
we do a paper version to whittle down The way the technology looks at a risk-
based approach with their assets is very
Issue 05
|
www.intelligentciso.com