BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for November, 2012

bmc-img5

Retina CS 4.0 and Remedy Ticketing Integration

Overview Retina CS enables teams to centrally manage organization-wide IT security and compliance initiatives from a single, web-based console. It provides discovery, prioritization, and remediation of security risks by delivering what matters the most – context. Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the…

Post by Jerome Diggs November 29, 2012
Tags:
, , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
sccminteg-img2

Microsoft SCCM Integration with Retina CS Threat Management Console

Overview Retina CS enables teams to centrally manage organization-wide IT security and compliance initiatives from a single, web-based console. It provides discovery, prioritization, and remediation of security risks by delivering what matters the most – context. Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the…

Post by Jerome Diggs November 28, 2012
Tags:
, , , , , , ,
ScanMetrics-screenshot

Adobe Flash Player and Air (APSB12-24) Critical Memory Vulnerabilities – November 2012

Nine new audits are being released in our Retina vulnerability scan engine to help customers identify a security vulnerability that can enable an attacker to gain control of a vulnerable system (CVE-2012-5274, CVE-2012-5275, CVE-2012-5276, CVE-2012-5277, CVE-2012-5278, CVE-2012-5279, CVE-2012-5280) These nine new audits have been released with Retina Network Community and the commercial version of Retina…

Post by Jerome Diggs November 9, 2012
Tags:
, , , ,
img-mobile

Most Versions of Android have SMiShing Vulnerability

Researchers at NC State University have discovered a vulnerability that allows a zero-permission App to fake SMS messages and thus lead to potential SMS Phishing (or SMiShing).   By creating fake SMS messages from legitimate looking sources, a mal-ware app could fool a user into clicking on a link to a rogue site with the intension of…

Post by Bobby DeSimone and Scott Ellis November 5, 2012
Tags:
, , , , , , ,