Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

BeyondTrust Fine-Tunes Privilege Management in Windows Vista

Security vendor BeyondTrust is introducing a version of its Privilege Manager software this week that safeguards Windows Vista environments by limiting end users' systems permissions to run only the applications and functions workers need to do their jobs.


Concerns about Microsoft's User Account Control are a bit over-stated. Since the early betas, UAC has been cleaned up a lot in response to user feedback. It doesn't present nearly as many problems as it once did. That said, BeyondTrust is a much more powerful framework that allows enterprises more granular control and flexible security. The company is taking the basic concept of least privilege and implementing it in a way that's actually achievable on Windows, which is impressive.
Jordan Wiens
NWC Contributing Technology Editor, Security

Privilege Manager 3.0 invokes the principle of least privilege to prevent users from installing, accessing or running malware or other potentially harmful software or applications on their Windows Vista systems. By locking down access to just the privileges workers need to perform their assigned tasks, the software alleviates a host of threats while still letting end users perform authorized tasks, according to BeyondTrust. Privilege Manager also provides IT with a tool to enforce compliance with corporate computing policies.

BeyondTrust is positioning the software as an alternative to Vista's UAC (User Account Control), which the security vendor says causes more problems than it solves. Vista's UAC asks end users to enter administrator account credentials to run software that exceeds standard privileges. BeyondTrust says providing end users with administrator user names and passwords can lead to a slew of security problems and administrative headaches.


Page:  1 | 2  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers