21.01.2016 Views

The GSN 2015 Digital Yearbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BeyondTrust<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Privileged Access Management Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

PowerBroker for Unix & Linux<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Whether the goal for attackers is to compromise sensitive<br />

government data, steal personally identifiable information<br />

(PII) or disrupt normal operations, the increasing<br />

sophistication of attacks is making it more difficult<br />

to safeguard the federal government’s cyber critical<br />

infrastructure. Adding to the complexity of cybersecurity<br />

is the compliance landscape for government agencies<br />

that changes with almost every administration. <strong>The</strong>re<br />

are always new requirements – and penalties – that<br />

agencies must anticipate, implement, and report on.<br />

Large-scale information breaches, like the recent Office<br />

of Personnel Management attack, often begin with an attacker<br />

exploiting a single external vulnerability on a lowlevel<br />

system or through contractor credentials, and then<br />

capitalizing on privileges to gain access to critical sys-<br />

tems and data. It is also very possible for a government<br />

employee to abuse access privileges from the inside to<br />

steal sensitive information. One has to look no farther<br />

than Edward Snowden as a proof point. BeyondTrust’s<br />

PowerBroker for Unix & Linux for least privilege helps<br />

balance the privilege requirements of users, with those<br />

of security and compliance teams, for routers/switches,<br />

and mainframes in Unix and Linux environments. <strong>The</strong><br />

solution enables IT Security teams to confidently deploy<br />

secure and compliant network gear, servers and<br />

desktops, while giving employees the correct amount of<br />

privileged access to applications without affecting a user’s<br />

ability to remain productive. <strong>The</strong> result is improved<br />

security, through reduced risk and attack surface, along<br />

with improved system uptime and availability. Sudo<br />

76

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!