Menu
Menu

BeyondTrust Earns ASTORS Award for Privileged Access Management4 min read

BeyondTrust

BeyondTrust

Last December, BeyondTrust won first place in the 2019 ASTORS Platinum Awards. “Its unified solutions offer the broadest set of privileged access management capabilities in the industry. With a flexible design that simplifies integrations, it improves user productivity and maximizes investments in IT and security” as explained by the American Security Today, who awarded the prize.

What are the ASTORS?

The Annual ‘ASTORS’ Awards are the United States National Security Awards Program. This program highlights the most advanced security solutions that reach the market. ASTORS evaluates nominations according to the innovation. Interoperability or specific impact is also important within each category. Impact on the industry and relationship with other technologies and it’s feasibility.

In 2019, William (Bill) Bratton, former NY PD police commissioner presented the ASTORS. Bratto talked about the history of the police in the United States. In addition, he highlighted the evolution of communication skills since 9/11.

What this award represents for BeyondTrust

Something to note is the work that BeyondTrust has done in recent years. The approach to security solutions has been such that recognition is well deserved. According to Morey Haber, Director of Technology and Security Information at BeyondTrust; “This victory stands out in security solutions for access management and cutting-edge privileges”.
 
Development and innovation to control, supervise and audit privileged access to US security. Haber added that “At BeyondTrust, we dedicate to our clients and partners in the public sector; Similarly, we will continue to offer our best technology and experience reducing threats and improving the security posture for Federal Agencies, as well as for companies around the world.”
 
Craig McCullough, Vice President of the Public Sector, explained; “As the world of IT is changing and evolving; it is essential to understand how to ensure the explosion of privileges within your environment. Our unified solutions offer the widest set of capabilities; administration, privileged access, etc. ”

BeyondTrust’s work

 
Cyber Security
 
BeyondTrust is a privileged access management platform. It offers integrated solutions that provide visibility and control over accounts and users. Uniting the broadest set of security capabilities, BeyondTrust simplifies implementations; It reduces costs, improves usability and reduces risks.
 
 
 
The BeyondTrust program offers solutions ranging from Password Management and Privileged Sessions. Endpoint Privilege Management and Privileged Remote Access are also supported.

Password Management and Privileged Sessions

Also known as “Password Safe“, it is an unmatched control system over remote access. Above all, Password Safe gives users the access they need while keeping attackers at bay. In addition, it focuses on the user. It protects and controls privileged remote access for insiders and providers. Password Safe handles internal and external compliance requirements. This is done with comprehensive auditing and forensic analysis. This privileged access grants security professionals to control and track access to critical systems.

The Password Safe system also prevents abuse of “privilege accumulator”. Access accumulators allow the progressive amassing of access rights. This can go beyond what an employee needs for his job. An employee with excessive rights may use them inappropriately. Besides, if an intruder gains access to an account with more benefits than is due, he will also have these. Both scenarios represent risks, but Password Safe grants the rapid application of small privileges to protect assets.

Endpoint Privilege Management

Endpoint Privilege Management focuses on eliminating unnecessary privileges. This way, it is possible to raise rights without hampering productivity. Different types of platforms can apply to this type of management. Windows, Mac, Unix, Linux, and network devices have support.
 
Privilege Management for Desktop allows protection for end-users. It also avoids and contains infringements on Microsoft Windows and macOS desktops. One of its most notable advantages is to raise applications, not users. This maintains the safety, productivity and operational efficiency of the users. All this by applying fewer privileges in the desktop environment. It also protects from infection by including approved applications, verifying their vulnerability status.

Privilege Management for Windows Servers

Passwords

This type of management simplifies the systems. Besides, administrators work with the security of an environment of small privileges. This system uses controls based on security policies, reducing attacks while providing access.
 
Additionally, it organizes applications based on trust. It establishes broad rules for automatic approval and full audit protection using codes.
 
This type of management allows you to take control of applications one step further. This is because it gives you the advantage of application vulnerability data. Thus, it provides intelligence and runtime on the risk of applications aimed at raising privileges.

Network Devices, IoT, ICS, and SCADA

Devices such as routers, IoT, ICS, and SCADA are critical to the security of each company’s networks. When unprotected, they allow external attackers and malware to enter our company environment. The best way to avoid cyber attacks is to check each device and have granular control with detailed audits.

Behavior analysis to detect suspicious user activity is important. Unlike some tools that scan specific devices, BeyondTrust allows you to protect all network devices with a single solution. Besides, it interrupts the administration of passwords after a user has access to the device, avoiding filtration.

If you are interested in receiving more information about this tool, do not hesitate to contact us. At GB Advisors we offer the best in the market, and we offer you a team of professionals willing to advise you and accompany you on your way to a more efficient IT environment.

Did you like this information? Share it with your colleagues:
Scroll to top