Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 27 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

BeyondTrust helps University of Winchester strengthen security without hampering productivity

by The Gurus
April 8, 2015
in Case Studies
Share on FacebookShare on Twitter

BeyondTrust has completed a successful project helping the University of Winchester deliver a campus-wide consistent and robust security policy while reducing IT management overheads.
 
A 175 year-old institution offering programmes of and employing over 1,000 staff with a community of over 8,000 students, the University of Winchester was ranked among the top 20 universities in England for overall satisfaction in the National Student Survey 2014.
 
The smooth-running of the campus includes a strong emphasis on IT security and managing vulnerabilities inadvertently caused by staff and students. Applications infrastructure manager Ian Short, said: “Our security policy is very much prevention rather than cure: we have to protect and support around 1,800 Windows desktops, across approximately 8,000 students, around 1,000 members of staff across 16 different departments and over 160 applications.  As well as running Windows on the desktops, we also have Windows back-end servers running in an Active Directory environment.
 
“We are quite fortunate in that we have not had any security breaches, but there is no room for complacency.  For instance, the network is set up so that both staff and students cannot just connect their own devices to back end systems and access is limited to the Internet, since much of the content that students require is available online anyway, this does not limit what they are able to do.”
 
Several years ago, the University identified the fact that managing user administrator privileges was a simple and effective way to make its security more robust and minimise the risk of malware attacks. However, the University could not lock down the entire network because of the flexibility that some users require. For instance, some staff – typically very knowledgeable and IT-savvy need their privileges to be elevated so that they can install and manage applications themselves.
 
“Also, while we could see the need to manage privilege, there was a concern about ensuring it did not create further additional administration workload,” explains Short. The University began an extensive market search to find an approach that would automate the privilege management process as much as possible yet remain flexible without increasing management overheads. Based on these criteria the University selected BeyondTrust PowerBroker for Windows Desktops and Servers, a centralised solution that uses a ‘least privilege’ model.
 
“Since we took that step, we have completely removed automatic administrator rights among our users, while simultaneously providing adequate rights to perform the tasks that students and staff need,” explains Short. Some of the key uses include elevating privileges for staff using multimedia packages in its multimedia centre, 30 applications on their desktops, and around half a dozen Windows functions.
 
“The net result is that no longer do we need to ‘punch holes’ in our security in order to complete certain tasks.  The added bonus is decreased time spent dealing with user support issues, meaning that the team can spend more time on other activities,” Short adds.
 
With the help of least privilege management from BeyondTrust, the University of Winchester has consistent, robust security policies campus-wide. “[This solution balances] the need to give staff flexibility when it is needed, without impacting on security or creating additional workload for the IT department,” Short said.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Mozilla disables opportunistic encryption to fix bypass bug

Next Post

Heartbleed one year on – who is responsible for preventing another incident?

Recent News

#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023
The Salt Security API Protection Platform is Now Available on Google Cloud Marketplace

The Salt Security API Protection Platform is Now Available on Google Cloud Marketplace

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information