Yesterday, we reported that BYOD in the enterprise was inviting more security threats — so for those looking for ways to protect their networks from unwanted hackers, BeyondTrust’s acquisition of Blackbird Group may help.
The addition aims to help BeyondTrust further its vision to simplify IT security operations management, while providing customers much-needed context to improve decision-making to protect against both internal and external security threats.
A Match Made in Security
BeyondTrust plans to leverage the Blackbird Windows system management product line to drive additional context and awareness around Active Directory and infrastructure components by offering real-time auditing capabilities for both privileged and normal users.
As a result, companies can accelerate compliance reporting by demonstrating controls of where individuals have access and what they are doing with that access. Real-time auditing events are fed into BeyondTrust’s risk analytics warehouse, providing improved context across the identity infrastructure.
What Does This Mean for Enterprise Security?
An Active Directory provides a central location for network administration and security, providing AD domain controllers with the ability to authenticate and authorize all users and computers in a Windows domain type network. It is responsible for assigning and enforcing security policies for all computers and installing or updating software.
BeyondTrust’s PowerBroker unlocks the value of Active Directory as an authoritative identity store, providing appropriate access for users, applications and tasks in both on-premises and cloud-based settings. In other words, it helps organizations better protect identity investments with real-time auditing, recovery and protection.
BeyondTrust's Power Broker helps to eliminate or elevate Window Admin rights.
Overall, with BeyondTrust and Blackbird, customers will benefit from being able to minimize deployment costs and administrator training, simplifying compliance and reduced data loss with real-time auditing and alerting across Active Directory and File resources, as well as increased visibility and improved decision making over native tools. All together, it means extra layers of security and protection from malicious attacks and inadvertent changes.
- 4 Trends in Workplace Communication [Infographic]
- 8 Companies Leading ECM Into 2015
- Can Egnyte Snuff Box's IPO Fire?
- Have Status Meetings at Work? No, No, No and ... No
- IDC: 10 Predictions For Emerging Technologies In 2015
- Mark Cuban: I Don't Take Risks But I Sure Can Dance
- Retail's Omnichannel, Data-Driven Revolution is Here