In this presentation from his highly popular webinar, Windows security expert, Russell Smith, explains how to effectively administer Windows systems without using privileged domain accounts, enabling you to drastically reduce your organization’s threat surface.
25. Manage Privileged Access to Servers
AD group
'Server 1'
AD group
'Server 2'
AD group
'Server 3'
BUILTIN
Admini
strators
BUILTIN
Admini
strators
BUILTIN
Admini
strators
37. Who is BeyondTrust?
EXPERIENCED
Prevents privilege
abuse and stops
data breaches for
4,000+ customers
worldwideCOMPLETE
PAM SOLUTION
Integrated privilege
& vulnerability
management,
threat & behavioral
analytics
LEADER
Gartner,
Forrester,
KuppingerCole
38. BeyondTrust Stops the Cyber Attack Chain
• Reduce attack surfaces by eliminating
credential sharing, enforcing least privilege,
and prioritizing and patching system
vulnerabilities
• Monitor and audit sessions for unauthorized
access, changes to files and directories, and
compliance
• Analyze behavior to detect suspicious user,
account and asset activity
39. Endpoint Privilege
Management
Remove excessive user privileges
and control applications on endpoints
WINDOWS | MAC
Enterprise Password
Security
Provide accountability and control over
privileged credentials and sessions
APPS | DATABASES | DEVICES
SSH KEYS | CLOUD | VIRTUAL
Server Privilege
Management
Control, audit and simplify access for
DevOps and business-critical systems
UNIX | LINUX | WINDOWS
ASSET & ACCOUNT
DISCOVERY
THREAT & VULNERABILITY
INTELLIGENCE &
BEHAVIORAL ANALYTICS
REPORTING &
CONNECTORS
POLICY & ACTION
RESPONSE
THE POWERBROKER PRIVILEGED ACCESS MANAGEMENT PLATFORM
BeyondInsight
40. Comprehensive Windows Privilege Management
Dynamic
Access Policy
Comprehensive
Least Privilege
Privileged
Threat
Analytics
Remote
System &
Application
Control
Auditing &
Governance
File &
Policy
Integrity
Monitoring
Privilege
Management
Best Practices