The BeyondInsight IT Risk Management Platform...BeyondInsight customers also gain a centralized...

2
A Collaborative Approach to IT Risk Management The BeyondInsight™ IT Risk Management Platform is an integrated suite of software solutions used by IT professionals and security experts to collaboratively: Reduce user-based risk and mitigate threats to information assets Address security exposures across large, diverse IT environments Comply with internal, industry and government mandates The BeyondInsight IT Risk Management Platform Large-scale information breaches often begin with an attacker exploiting a single external vulnerability on a low-level system, and then capitalizing on privileges to gain access to critical systems and data. BeyondInsight delivers a comprehensive view of the vulnerabilities that provide doors into an environment, as well as the privileges that present corridors to sensitive assets. The security team benefits from being able to correlate vulnerability information with user activity, while IT gains a clearer view of how privilege policies impact overall security. This fusion of asset and user intelligence enables IT and Security to collectively reduce risk across complex environments. BeyondInsight Empowers IT and Security Teams to ... Discover network, web, mobile, cloud and virtual infrastructure Profile asset configuration and access risk potential Detect applications and OS functions that require administrator privileges Manage access to admin and root privileges across all infrastructure Identify vulnerabilities enterprise-wide Analyze threat potential, return on remediation, and more Remediate vulnerabilities through integrated patch management Report on vulnerabilities, compliance, benchmarks, and more Protect endpoints from client-side attacks With BeyondInsight, IT and Security teams have a single, contextual lens through which to view user and asset risk. This clear, consolidated risk profile enables proactive, joint decision-making while ensuring that daily operations are guided by common goals for risk reduction. BeyondInsight customers also gain a centralized reporting and analytics platform that provides IT and business leaders with visibility into the real risks facing their organizations, while demonstrating the efficacy of risk reduction efforts enterprise-wide. Available in software and hardware appliance formats, BeyondInsight integrates two foundational security methodologies: Privileged Account Management enforces and audits access control policies by enabling IT to limit access to key systems, applications and data. Vulnerability Management enables Security to assess risk, measure breach likelihood, and make remediation recommendations.

Transcript of The BeyondInsight IT Risk Management Platform...BeyondInsight customers also gain a centralized...

Page 1: The BeyondInsight IT Risk Management Platform...BeyondInsight customers also gain a centralized reporting and analytics platform that provides IT and business leaders with visibility

DATASHEET

A Collaborative Approach to IT Risk Management

The BeyondInsight™ IT Risk Management Platform is an integrated suite of software solutions used by IT professionals and security experts to collaboratively:

• Reduce user-based risk and mitigate threats to information assets

• Address security exposures across large, diverse IT environments

• Comply with internal, industry and government mandates

The BeyondInsight IT Risk Management Platform

Large-scale information breaches often begin with an attacker exploiting a single external vulnerability on a low-level system, and then capitalizing on privileges to gain access to critical systems and data.

BeyondInsight delivers a comprehensive view of the vulnerabilities that provide doors into an environment, as well as the privileges that present corridors to sensitive assets. The security team benefits from being able to correlate vulnerability information with user activity, while IT gains a clearer view of how privilege policies impact overall security.

This fusion of asset and user intelligence enables IT and Security to collectively reduce risk across complex environments.

BeyondInsight Empowers IT and Security Teams to ...

• Discover network, web, mobile, cloud and virtual infrastructure

• Profile asset configuration and access risk potential

• Detect applications and OS functions that require administrator privileges

• Manageaccess to admin and root privileges across all infrastructure

• Identifyvulnerabilities enterprise-wide

• Analyze threat potential, return on remediation, and more

• Remediatevulnerabilities through integrated patch management

• Reporton vulnerabilities, compliance, benchmarks, and more

• Protect endpoints from client-side attacks

With BeyondInsight, IT and Security teams have a single, contextual lens through which to view user and asset risk. This clear, consolidated risk profile enables proactive, joint decision-making while ensuring that daily operations are guided by common goals for risk reduction.

BeyondInsight customers also gain a centralized reporting and analytics platform that provides IT and business leaders with visibility into the real risks facing their organizations, while demonstrating the efficacy of risk reduction efforts enterprise-wide.

Available in software and hardware appliance formats, BeyondInsight integrates two foundational security methodologies:

Privileged Account Management enforces and audits access control policies by enabling IT to limit access to key systems, applications and data.

Vulnerability Management enables Security to assess risk, measure breach likelihood, and make remediation recommendations.

Page 2: The BeyondInsight IT Risk Management Platform...BeyondInsight customers also gain a centralized reporting and analytics platform that provides IT and business leaders with visibility

© 2014 BeyondTrust Corporation. All rights reserved. BeyondTrust, BeyondInsight and PowerBroker are trademarks of BeyondTrust in the United States and other countries. Microsoft, Windows, and other marks are the trademarks of their respective owners. January 2014

PowerBroker Privileged Account Management Capabilities for IT Professionals

BeyondInsight’s Privileged Account Management capabilities enable organizations to simplify management of privileged accounts and privileged access to critical capabilities. With our PowerBroker® solutions, IT professionals can easily enforce least-privilege best practices and provide the access employees need to perform their jobs safely, without obstructing IT or end-user productivity.

When PowerBroker is used with BeyondInsight, System Administrators are able to not only address the critical issues of authorizing and auditing access, but also leverage BeyondInsight’s vulnerability and risk data to: • Planleastprivilegedeployments by discovering current users, processes, policies and

applications – revealing gaps between today’s environment and an optimal, granularly secured environment.

• UtilizeADtoauthenticate within UNIX, Linux and Mac environments, reducing the number of passwords and the associated risk of malicious access.

• Manageprivilegedandsharedaccountsby reducing the scope of shared or super-user service accounts and controlling access via rotated passwords on servers and other resources.

• ElevateWindowsAdminprivileges as needed for business applications, knowing that an application isn’t malicious and preventing frustrated end users from impacting day-to-day operations and flooding the Help Desk.

• Auditallaccessandchanges across Active Directory and Exchange, UNIX and Linux servers, and Windows servers and desktops – addressing compliance requirements and enabling rollback of erroneous changes.

PowerBroker customers reduce security exposures while increasing productivity enterprise-wide. The BeyondInsight platform enables them to track real-time and historical authentication and authorization activities alongside vulnerability data. This “single lens” approach enables efficient risk mitigation and ensures cohesive documentation of ongoing audit and compliance initiatives.

Retina CS Enterprise Vulnerability Management Capabilities for Security Teams

BeyondInsight’s Retina CS Enterprise Vulnerability Management capabilities provide security teams with context-aware vulnerability assessment and risk analysis. Retina’s results-driven architecture enables security professionals to proactively identify exposures, analyze business impact, and plan and conduct remediation across network, web, mobile, cloud and virtual infrastructure.

BeyondInsight customers leverage Retina CS Enterprise Vulnerability Management to:

• Determine what to fix first, what to fix next – and why

• Prioritizepeople, processes, and technology to address exposures

• Predictreturn on remediation prior to committing resources

• Measurethe efficacy of vulnerability management processes over time

• Share results in terms and formats relevant to specific audiences

The BeyondInsight platform enriches Retina vulnerability assessments with powerful reporting and analytics, enabling security professionals to make smart decisions, effectively communicate risk, and report progress to executives and compliance auditors.

Unified Discovery, Profiling, Management, Reporting & Analytics

Whether you configure BeyondInsight for vulnerability management, privilege management, or both, you have access to powerful, centralized features including:

• Unmatched Reporting & Analytics Report on compliance, benchmarks, threat analytics, what-if scenarios, resource requirements, and more.

• Integrated Data Warehouse View, sort and filter historical data for multiple perspectives.

• Comprehensive Discovery Locate network (local & remote), web, mobile, cloud and virtual assets.

• Asset Profiling Profile IP, DNS, OS, Mac address, ports, services, software, processes, hardware, event logs, and more.

• Asset Smart Groups Group, assess, & report on assets by IP range, naming convention, OS, domain, applications, business function, Active Directory, and more.

• Role-Based User Management Import from Active Directory or set custom permissions.

• Workflow, Ticketing & Notification Coordinate IT and security teams.

• Third-Party IntegrationShare data with leading SIEM, GRC, NMS and help desk solutions.

CONTACT BeyondTrustNorthAmericaTel: 800.234.9072 or [email protected]

BeyondTrustEMEATel: + 44 (0) 8704 [email protected]

CONNECT

Twitter: @beyondtrustFacebook.com/beyondtrustLinkedin.com/company/beyondtrust

Learn more at www.beyondtrust.com