BeyondTrust

Tuesday, September 14, 2010

Attention Auditors! Visit ISACA Today at Caesar's Palace in Las Vegas, NV

Don't forget to stop by ISACA Booth # 25 today to learn how PIM ensures auditors meet compliance risks & satisfy audits.


This conference builds on and includes the key elements of information security management practices and information security practices. It also covers related business, program and technical issues, and the impact of risk management. 

BeyondTrust is located at Booth #25, and will discuss Privileged Identity Management (PIM) and the importance for auditors to learn how PIM solutions:
  • Securely manage privileged accounts and the risks posed by such accounts
  • Help satisfy audits
  • Effectively manage compliance risks within an enterprise
  • Produce audit reports with ease
 ---

13-15 September 2010 | Las Vegas, Nevada, USA
Caesars Palace
BeyondTrust Software, Inc. -- Booth 25

Thursday, September 9, 2010

More from VMWorld on Virtualization Security

At VMWorld we had the pleasure of meeting with Jon Brodkin from Network World, who published what might be the best-written explanation of how IT administrators can take advantage of the hypervisor yet.

Naturally, as Jon absorbed what our very own Principal Systems Engineer Jordan Bean showed him in a live demonstration and walked it over to VMWare’s booth, his line of questioning on ESX security may have put some of our virtualization partners on the defensive.

What we should add, is that the ability for IT administrators to use the hypervisor to cover their tracks, hide their activities and ultimately get away with data theft is NOT a VMWare vulnerability - it’s a virtualization vulnerability.

With administrative access and a few changes to the process, we could steal data undetected from any virtual server. This isn’t a shortcoming in their software, but a new danger for root-level access.

In many cases measures are already in place to protect the company from abuse of root-level access on physical servers, but awareness and understanding of how that translates onto their virtual counterparts is low.

You saw in our last post that most VMWorld attendees have virtualized at least some of their mission-critical servers and most believe their coworker could steal data from those servers if motivated. Applying ‘least privilege’ to mitigate risk from this kind of privileged access has always been our domain – virtual or not.
 

© 1985-2009 BeyondTrust Software, Inc. All rights reserved.
Site MapContact UsPrivacy Policy/ California Privacy RightsHome