This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

BeyondTrust launches solution to combine session monitoring with vulnerability and identity management

Share this article:

BeyondTrust has announced the launch of version 6.0 of its PowerBroker for Windows solution, to offer session and file integrity monitoring capabilities.

The company said the new product includes an ability to leverage privilege and vulnerability data scanned by its Retina CS threat management console, which will allow users to take a system's overall risk into context when deciding what level of privileges a user or system should be given.

Also included is session monitoring capabilities to record, track or disallow user activity on a per application basis.

Brad Hibbert, vice president, product strategy and operations at BeyondTrust, said: “Security teams more often make critical business decisions based on threats after the fact, regardless of addressing the context of those threats.

“This new product release allows organisations to make more effective security decisions, by delivering the context and monitoring tools to effectively mitigate vulnerabilities and control access in Windows systems.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

CISOs offered new way to secure Android devices

CISOs offered new way to secure Android devices

US and German researchers have come up with a novel way to secure the notoriously flaw-ridden Android - a framework that allows corporate and other users to rapidly add security ...

Rogue UK and US spies 'help safeguard Tor network'

Rogue UK and US spies 'help safeguard Tor ...

Extremists and paedophiles protected by 'white hat' hackers in GCHQ and NSA, says unconfirmed BBC report.

Cyber Security Challenge joins with GCHQ for security development programme

Cyber Security Challenge joins with GCHQ for security ...

The Cyber Security Challenge is linking with GCHQ to develop counter-espionage and cyber security skills for the real world.