BeyondTrust PowerBroker Password Safe

Size: px
Start display at page:

Download "BeyondTrust PowerBroker Password Safe"

Transcription

1 BeyondTrust PowerBroker Password Safe A Frost & Sullivan Product Review

2 frost.com BEYONDTRUST POWERBROKER PASSWORD SAFE From small businesses to enterprises, the security of information, applications, and assets is a paramount concern. Innumerable attack strategies can steal or deny services. Securing the infrastructure against inappropriate use cannot only obstruct IT operations, but also reduce productivity for users if they are unable to access accounts needed to perform their jobs. Guarding against inappropriate access and enabling operational effectiveness while ensuring compliance is a difficult balancing act without appropriate tools. The Verizon 2013 Data Breach report notes that if single-factor passwords were eliminated, nearly 80% of attempted hacks would need to adapt or die. Password theft and loose password protocols leave companies vulnerable to insider attacks or to external attacks that leverage insider credentials. However, passwords remain the most ubiquitous way to gain access, requiring password management that is versatile, nimble, and secure. For operational efficiency, password processes should be highly automated so IT departments can focus on keeping networks and applications online securely and continuously. BEYONDTRUST PLATFORM BeyondInsight Console BeyondTrust PowerBroker Password Safe now integrates with the vendor s advanced risk management platform, BeyondInsight. As one module within BeyondTrust s Privileged Account Management solutions, PowerBroker Password Safe focuses on internal risk managing, securing and auditing of privileged accounts to enable access required to perform jobs safely while meeting compliance requirements, and without obstructing the productivity of IT or business users. Password Safe customers can also gain visibility over the risk associated with managed assets through the single console. The optional Vulnerability Management module focuses on external risks, proactively identifying exposures, analyzing business impact, and optimizing remediation plans. The power of the BeyondTrust approach is the combination available in BeyondInsight, providing the vulnerability and threat context while managing passwords controlled by Powerbroker Password Safe. Alerting in today s security-conscious IT environments typically creates an overabundance of data and alerts, as was also highlighted in the Verizon data breach report. Having too much data without context is not effective in identifying vulnerabilities or breaches. BeyondInsight solves this problem by providing the ability to view, sort and filter historical data for both privileged access and vulnerabilities. Analytics and reports for compliance, benchmarks, and a variety of what-if scenarios can be created for any set of hardware, devices or server groups managed by PowerBroker Password Safe. AGENTLESS, WEB-BROWSER APPLICATION Lightweight Software PowerBroker Password Safe is an agentless, Web-based password manager delivered in a secure, hardened appliance format with no reliance on Java. There are two other approaches to password management offered by other vendors in the space: 1. Password management systems that are loaded as a software application are inflexible. For organizations that have many locations, or that work with sub-contractors, the password vaults from separate locations have to be securely linked. Additionally, software as an appliance can become obsolete, but BeyondTrust handles updates through maintenance. 2

3 BeyondTrust PowerBroker Password Safe 2. Agentless password management systems that use JavaScript have large overheads. The process to establish connectivity between two servers using JavaScript is laborious. The receiving server has to rewrite and upload the request, listen, establish a secure shell (SSH) port, and then re-encrypt the passwords and user ID. ADMINISTRATION Role-Based Access Control (RBAC) to Resources The first and fundamental purpose of a password management system is to provide end users with the appropriate access to specific applications, data, and networks. The best way to accomplish this is to establish RBAC. Groups can be synchronized with Active Directory (AD) in Password Safe. Each group in Password Safe can give different users different permissions to groups of resources. For example, the SQL admin group in AD might have requestor role access to the SQL Server group of managed accounts. When a user is removed from a group, role-based access to the managed account group is removed, such as when a user leaves the company. ACCOUNT/PASSWORD MANAGEMENT Password Management One of the biggest security breaches a company can incur is lapses in password lifecycles. In Password Safe, a company can ensure that all passwords are regularly changed according to policy interval and complexity requirements. At each interval, a random password is generated and the account updated. Service Account Management Each individual account requires special treatment. A company wishes to have all service accounts changed on a pre-defined schedule and have the services kept in sync. The service account is configured for auto-management in Password Safe. When a service account password is changed (manually or automatically), the logon credentials are updated on any Windows service dependent on the account. System/Account Auto Discovery A happy headache that businesses endure is expansion. When new equipment is purchased, the company wishes to ensure that all systems are brought under management and any new systems are brought into compliance without manual intervention. A network scan is configured on Password Safe. A smart rule is created to automatically add the system to Password Safe. Accounts on discovered systems can automatically be managed and made available to users via policy. ACCOUNT/PASSWORD ACCESS Std. Password Requestor/Approval Scenario Importing from Active Directory based on roles can be used for access controls, or custom permissions and exceptions can be used to access an account; either way, approval can be required before access. The user logs into Password Safe and requests access to the account. A request notification is sent to the approver. The approver logs into Password Safe and approves or denies the request. The user is notified by of approval (if appropriate) and the user accesses the password. 3

4 frost.com Break-Glass Scenario Due to unforeseen circumstances, a user may need a password when there are potentially no approvers available. The user logs into Password Safe and requests access to a break-glass account. Access is immediately given, and an alert is generated stating access was given without dual control. Command Line Interface/Application Programming Interface (CPI/API) Access The problem with hard-coded passwords is that they can be lifted in a keystroke malware attack. A company can migrate away from the use of hard-coded passwords from applications and scripts. An external program is given access to a managed Password Safe account. A CLI (or API) call is scripted in place of a hard-coded password either directly or through wrapper script. When the script is executed, the password is retrieved dynamically from the Password Safe appliance. SESSION (PROXY) ACCESS TO ACCOUNTS Std. Remote Desktop Protocol (RDP) Requestor/Approval Scenario PowerBroker Password Safe provides a graphical user interface (GUI) to handle requests and approvals without divulging the password to the account. In this scenario, the user logs into Password Safe and requests access to the account. The request is sent for approval. The approver logs into Password Safe and approves or denies the request. The user is notified by of approval (if appropriate). The user clicks the RDP session button and is automatically logged into an RDP session through Microsoft Terminal Services Client (MSTSC), and the session is recorded. Std. Secure Shell (SSH) Requestor/Approval Scenario SSH is a public-key cryptographic protocol designed to link a server and a client together. Password Safe can generate a password request to authenticate the connection and decrypt the cypher text. For example, if a user needs access to a SSH session without knowing the password of the account, the user logs into Password Safe and requests access to the account. The request notification is sent to the approver. The approver logs into Password Safe and approves or denies the request. The user is notified by of approval (if appropriate). The user clicks the SSH session button and is automatically logged into an SSH session through PuTTY (or similar). Recorded Session Review A company is able to review a previously recorded SSH or RDP session. A user with Information Security Administrator (ISA) permissions logs into Password Safe and a list of previously recorded sessions that the user is authorized to view is available for selection. Upon selection of a session and user, playback controls enable viewing. CONCLUSION Endorsement BeyondTrust PowerBroker Password Safe is a solid tool for the secure procurement and dissemination of passwords. The ability to run network scans helps an IT department reconfigure the password vault as needed. Lightweight software helps with the transitions between servers and clients, and smartrules allow groups of assets to be profiled, accessed and analyzed for compliance and threat assessment. Account and password access, as well as password management procedures, mitigate the chance of man-in-the-middle attacks. Frost & Sullivan endorses PowerBroker Password Safe. 4

5 Auckland Bahrain Bangkok Beijing Bengaluru Buenos Aires Cape Town Chennai Colombo Delhi/NCR Detroit Dubai Frankfurt Houston Iskander Malaysia/Johor Bahru Istanbul Jakarta Kolkata Kuala Lumpur London Manhattan Miami Milan Mumbai Moscow Oxford Paris Pune Rockville Centre San Antonio São Paulo Seoul Shanghai Shenzhen Silicon Valley Singapore Sophia Antipolis Sydney Taipei Tel Aviv Tokyo Toronto Warsaw Silicon Valley 331 E. Evelyn Ave., Suite 100 Mountain View, CA Tel Fax San Antonio 7550 West Interstate 10, Suite 400 San Antonio, TX Tel Fax London 4 Grosvenor Gardens London SW1W 0DH Tel +44 (0) Fax +44 (0) GoFrost [email protected] Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today s market participants. For more than 50 years, we have been developing growth strategies for the Global 1000, emerging businesses, the public sector and the investment community. Is your organization prepared for the next profound wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough best practices, changing customer dynamics and emerging economies? For information regarding permission, write: Frost & Sullivan 331 E. Evelyn Ave., Suite 100 Mountain View, CA 94041

Customer Perspectives Series: Law Firm Herbert Smith Freehills Uses BrightTALK to Provide High-Value Client Training

Customer Perspectives Series: Law Firm Herbert Smith Freehills Uses BrightTALK to Provide High-Value Client Training Customer Perspectives Series: Law Firm Herbert Smith Freehills Uses BrightTALK to Provide High-Value Client Training Featured Company: A Frost & Sullivan Case Study frost.com HSF Customer Education and

More information

Big Data Applications in the Contact Center: Opportunities and Challenges

Big Data Applications in the Contact Center: Opportunities and Challenges Big Data Applications in the Contact Center: Opportunities and Challenges A Frost & Sullivan Case Study frost.com Big Data in Action: TalkTalk and Nexidia... 3 The Situation... 3 The Solution... 3 Adding

More information

Nexidia and Blue Cross and Blue Shield of North Carolina Voice of the Customer (VoC) Analytics to Increase Clarity and Ease of Use for Customers

Nexidia and Blue Cross and Blue Shield of North Carolina Voice of the Customer (VoC) Analytics to Increase Clarity and Ease of Use for Customers 50 Years of Growth, Innovation and Leadership Nexidia and Blue Cross and Blue Shield of North Carolina Voice of the Customer (VoC) Analytics to Increase Clarity and Ease of Use for Customers A Frost &

More information

Secure Video Collaboration:

Secure Video Collaboration: Secure Video Collaboration: How to Ensure Security of Your Cloud Video Conferencing Solution A Frost & Sullivan White Paper Sponsored by Lifesize frost.com Introduction... 3 The Security Challenge... 3

More information

Video-enabled unified communications

Video-enabled unified communications Video-enabled unified communications We are now Unify. Unify continues to be one of the world s largest communications software and services firms. This document contains third-party content that refers

More information

Leveraging Specialized Hardware and Expertise in a Mid-Market Cloud

Leveraging Specialized Hardware and Expertise in a Mid-Market Cloud Leveraging Specialized Hardware and Expertise in a Mid-Market Cloud September 2014 Karyn Price Industry Analyst Cloud Computing Leveraging Specialized Hardware and Expertise in a Mid-Market Cloud INTRODUCTION

More information

Emerging Trends in Web Conferencing: Consumerization and Convergence Reshape the Market

Emerging Trends in Web Conferencing: Consumerization and Convergence Reshape the Market Emerging Trends in Web Conferencing: Consumerization and Convergence Reshape the Market A Frost & Sullivan Executive Summary Based on Analysis of the Global Web Conferencing Market, December 2014 Sponsored

More information

Video Collaboration in the Financial Services Industry

Video Collaboration in the Financial Services Industry Video Collaboration in the Financial Services Industry Navigating a Complex Environment with Greater Productivity A Frost & Sullivan White Paper Roopam Jain www.frost.com Frost & Sullivan INTRODUCTION

More information

Moving from Multi-channel to Omni-channel Customer Engagement:

Moving from Multi-channel to Omni-channel Customer Engagement: Moving from Multi-channel to Omni-channel Customer Engagement: Intelligent Interaction Analytics are the Foundation A Frost & Sullivan White Paper frost.com Introduction... 3 Growth of Digital Customer

More information

Marketing Automation:

Marketing Automation: Marketing Automation: An Essential Tool to Engineer a Better Marketing Model for the Manufacturing Industry A Frost & Sullivan White Paper frost.com The Need to Build a Better Mouse Trap... 3 Retooling

More information

Unified Communications:

Unified Communications: A Frost & Sullivan White Paper 2014 Frost & Sullivan India ICT Awards: Unified Communications Application Vendor of the Year SIGNIFICANCE OF UNIFIED COMMUNICATIONS The business landscape in India has changed

More information

An Overview and Competitive Analysis of the One-Time Password (OTP) Market

An Overview and Competitive Analysis of the One-Time Password (OTP) Market An Overview and Competitive Analysis of the One-Time Password (OTP) Market A White Paper Prepared by Martha Vazquez, Research Analyst TABLE OF CONTENTS Introduction... 3 Brief Overview of the OTP Market...

More information

Premise vs. Hosted Contact Center: Total Cost of Ownership Analysis

Premise vs. Hosted Contact Center: Total Cost of Ownership Analysis vs. Contact Center: Total Cost of Ownership Analysis A White Paper Sponsored By TABLE OF CONTENTS Introduction... 3 TCO Analysis... 4 Background... 4 Systems and Applications... 4 Implementation... 4 Maintenance

More information

An Overview and Competitive Analysis of the One-Time Password (OTP) Market

An Overview and Competitive Analysis of the One-Time Password (OTP) Market 50 Years of Growth, Innovation and Leadership An Overview and Competitive Analysis of the One-Time Password (OTP) Market A Frost & Sullivan White Paper Richard Martinez Research Analyst www.frost.com Frost

More information

BENEFITS OF SERVERLESS COMPUTING

BENEFITS OF SERVERLESS COMPUTING BENEFITS OF SERVERLESS COMPUTING A Frost & Sullivan Market Insight INTRODUCTION TO SERVERLESS COMPUTING Serverless Computing is an integrated NVR/SAN platform that runs video management software directly

More information

BUILDING A SUCCESSFUL ROADMAP TO THE CLOUD

BUILDING A SUCCESSFUL ROADMAP TO THE CLOUD BUILDING A SUCCESSFUL ROADMAP TO THE CLOUD INTRODUCTION Chances are your company has dabbled in the cloud. Perhaps you have moved the company Website to an on-demand cloud-based infrastructure service.

More information

An Advanced and Integrated Approach to Managed Enterprise Network Security

An Advanced and Integrated Approach to Managed Enterprise Network Security An Advanced and Integrated Approach to Managed Enterprise Network Security A Frost & Sullivan White Paper Chris Rodriguez, Senior Industry Analyst Sponsored by: Masergy frost.com Introduction... 3 The

More information

A Total Cost of Ownership Analysis of SAP s Contact Center Solution:

A Total Cost of Ownership Analysis of SAP s Contact Center Solution: A Total Cost of Ownership Analysis of s Contact Center Solution: Cost Savings Opportunity for Customers A Frost & Sullivan White Paper Robert Worden frost.com Abstract... 3 The Contact Center Environment...

More information

Extending the Value of IP Communications Investments with SIP Trunking

Extending the Value of IP Communications Investments with SIP Trunking 50 Years of Growth, Innovation and Leadership Extending the Value of IP Communications Investments with SIP Trunking SIP Trunking Enables a Next-Generation Communications Environment A Frost & Sullivan

More information

Preparing Your Infrastructure for Enterprise Social Software: Strategies for Success

Preparing Your Infrastructure for Enterprise Social Software: Strategies for Success Preparing Your Infrastructure for Enterprise Social Software: Strategies for Success A Frost & Sullivan White Paper By Melanie Turek Industry Director EXECUTIVE SUMMARY As organizations navigate through

More information

Webinars Drive Lead Generation:

Webinars Drive Lead Generation: 50 Years of Growth, Innovation and Leadership Webinars Drive Lead Generation: Trada Uses ReadyTalk Web Conferencing for Thought Leadership, Qualified Leads A Frost & Sullivan Case Study www. Frost & Sullivan

More information

Best Practices for Managing Teleworkers: Changing Attitudes, Changing Ways

Best Practices for Managing Teleworkers: Changing Attitudes, Changing Ways Best Practices for Managing Teleworkers: Changing Attitudes, Changing Ways Compared to nonteleworkers, employees who telework: Are more clear about work expectations Have a greater sense of control Have

More information

Acuity-Based Staffing as the Key to Hospital Competitiveness: Why the Smartest Hospitals are Tying their Nurse Labor Investment to Patient Care

Acuity-Based Staffing as the Key to Hospital Competitiveness: Why the Smartest Hospitals are Tying their Nurse Labor Investment to Patient Care Acuity-Based Staffing as the Key to Hospital Competitiveness: Why the Smartest Hospitals are Tying their Nurse Labor Investment to Patient Care A Frost & Sullivan White Paper frost.com Acuity-Based Staffing

More information

The Changing Role of Mobile Communications in the Workplace

The Changing Role of Mobile Communications in the Workplace The Changing Role of Mobile Communications in the Workplace A Frost & Sullivan White Paper TABLE OF CONTENTS Introduction... 3 The Changing Nature of Business Communications... 3 Redefining Mobile Workers...

More information

Cloud Contact Center Market Trends:

Cloud Contact Center Market Trends: 50 Years of Growth, Innovation and Leadership Cloud Contact Center Market Trends: Movement from Best-of-Breed to Suites A Frost & Sullivan Executive Brief www. Frost & Sullivan INTRODUCTION The cloud model

More information

Push-to-talk Over Cellular: The Next Generation for Land Mobile Radio. A Frost & Sullivan White Paper

Push-to-talk Over Cellular: The Next Generation for Land Mobile Radio. A Frost & Sullivan White Paper Push-to-talk Over Cellular: The Next Generation for Land Mobile Radio A Frost & Sullivan White Paper frost.com Introduction... 3 Challenges for Traditional LMR Systems... 3 Significant Capital Investment

More information

Smart City as a Service: Using Analytics to Equip Communities for Data-Driven Decisions

Smart City as a Service: Using Analytics to Equip Communities for Data-Driven Decisions Smart City as a Service: Using Analytics to Equip Communities for Data-Driven Decisions A Frost & Sullivan White Paper Brian Cotton frost.com Challenges Municipal Officials Face Delivering Services...

More information

GETTING THE MOST FROM YOUR VIRTUALIZED DATA CENTER WITH CONVERGED SYSTEMS

GETTING THE MOST FROM YOUR VIRTUALIZED DATA CENTER WITH CONVERGED SYSTEMS GETTING THE MOST FROM YOUR VIRTUALIZED DATA CENTER WITH CONVERGED SYSTEMS INTRODUCTION Not since the Industrial Revolution has technology played such a revolutionary role in business. Business trends such

More information

Resolving Wi-Fi Security in BYOD Environments

Resolving Wi-Fi Security in BYOD Environments Resolving Wi-Fi Security in BYOD Environments A Frost & Sullivan White Paper Avni Rambhia, Industry Manager ICT Jarad Carleton, Principal Consultant ICT frost.com BYOD is Everywhere... 3 Enterprise Security

More information

Visual Collaboration: Boost Employee Productivity and Drive Customer Interaction

Visual Collaboration: Boost Employee Productivity and Drive Customer Interaction 50 Years of Growth, Innovation and Leadership Visual Collaboration: Boost Employee Productivity and Drive Customer Interaction A Frost & Sullivan White Paper www. Visual Collaboration: Boost Employee

More information

Service Providers: How Storage Infrastructure Can Help You Differentiate and Add Value to Your Cloud Storage Services

Service Providers: How Storage Infrastructure Can Help You Differentiate and Add Value to Your Cloud Storage Services Service Providers: How Storage Infrastructure Can Help You Differentiate and Add Value to Your Cloud Storage Services A Product Brief Sponsored by IBM May 2014 Storage Infrastructure Helps Differentiate

More information

How the Right Infrastructure Can Prepare Your Data Center for Business Disruptors

How the Right Infrastructure Can Prepare Your Data Center for Business Disruptors How the Right Infrastructure Can Prepare Your Data Center for Business Disruptors An Executive Brief Sponsored by Hewlett Packard Enterprise Lynda Stadtmueller Vice President, Cloud Computing October 2015

More information

Leveraging the Power of Video Conferencing for Business:

Leveraging the Power of Video Conferencing for Business: 50 Years of Growth, Innovation and Leadership Leveraging the Power of Video Conferencing for Business: Best Practices for Supporting Collaboration in the 21st Century A Frost & Sullivan White Paper www.frost.com

More information

All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Your Company

All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Your Company All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Your Company An Executive Brief Sponsored by IBM Lynda Stadtmueller Program Director, Cloud Computing February 2014 All Clouds

More information

DEVELOPING COMMUNICATION AND COLLABORATION IN BANKING AND FINANCIAL SERVICES FOR INCREASED BUSINESS VALUE

DEVELOPING COMMUNICATION AND COLLABORATION IN BANKING AND FINANCIAL SERVICES FOR INCREASED BUSINESS VALUE DEVELOPING COMMUNICATION AND COLLABORATION IN BANKING AND FINANCIAL SERVICES FOR INCREASED BUSINESS VALUE A White Paper TABLE OF CONTENTS TABLE OF CONTENTS Introduction 3 Overview of Communication and

More information