BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

BeyondInsight Evolution is Paving the Way for a Revolution in IT Risk Management

Posted May 27, 2014    Morey Haber

2008: Unifying Vulnerability Management + Endpoint Protection

It all started in 2008, when eEye Digital Security transformed its REM management platform into Retina CS, a solution that could do more than just vulnerability management. Retina CS (short for “Compliance and Security” – or, as we joke internally, for “Chris Silva” our Chief Architect) merged the concepts of vulnerability management and endpoint protection into a single security information technology platform. This was ground-breaking and revolutionary at the time, since it could not only identify asset vulnerabilities but also reveal how assets were being attacked.

2012-2013: Completing the Vulnerability Management Life Cycle

Just before BeyondTrust’s acquisition of eEye, Retina CS added Regulatory Reporting, Configuration Compliance, and Patch Management capabilities to the mix. These extended Retina’s coverage of the vulnerability management life cycle to finding vulnerabilities, analyzing attacks, providing mitigation, and reporting on the results. In addition, Retina CS introduced industry-first technology for cloud, virtual and mobile device assessment – plus an analytics and reporting engine dubbed “Retina Insight.” Even today, no other vulnerability management vendor ships a structured big data warehouse with their product. Ground-breaking and revolutionary to say the least – and centralized under the same installer, platform, and license key.

Retina CS vulnerability management interfaceRetina CS vulnerability management interface

2014: Bridging Vulnerability Management and Privileged Account Management

Fast-forward to January 2014, when BeyondTrust released the BeyondInsight IT Risk Management platform, built on Retina CS technology. Why? It was clear that, in addition to reducing external risk to infrastructure, Retina CS could mitigate internal, user-based risk by incorporating privileged account management data. This concept merges asset risk management with least-privilege access monitoring on Windows, UNIX, Linux, and OS X devices.

A new revolution is being waged. Imagine knowing all the risks about an asset and how users are interacting with those assets. BeyondInsight can do that – Today!

Windows endpoint risk analysis within the BeyondInsight platform
Windows endpoint risk analysis within the BeyondInsight platform

The Future of IT Risk Management

Another generation is in beta: All user accounts discovered and reported in BeyondInsight can now be managed with native PowerBroker Password Safe technology. This evolution enables a complete IT risk management workflow for assets and users. BeyondInsight customers can now not only uncovered asset risk, but also control user access via least privilege management and password vaulting for accounts, services and local access. Using a single platform for all these functions has huge implications for vendor consolidation, cost reduction and training efficiency – let alone risk mitigation.

Password vaulting within the BeyondInsight platformPassword vaulting within the BeyondInsight platform

BeyondTrust is leading the way among security management platforms, not by just adding features, but by rethinking how teams manage modern threats and security. Security solutions have evolved. Welcome to the revolution!

> Learn more about the BeyondInsight IT Risk Management Platform
> Learn more about PowerBroker Password Safe
> White paper: Fusing Vulnerability Data and User Intelligence

Tags:
, , , , , , ,

Leave a Reply

Additional articles

PowerBroker for Unix & Linux helps prevent Shellshock

Posted September 25, 2014    Paul Harper

Like many other people who tinker with UNIX and Linux on a regular basis, BASH has always been my shell of choice.  Dating back to the early days moving from Windows to a non-Windows platform, mapping the keys correctly to allow easy navigation and control helped ensure an explosion of use for the shell. Unfortunately,…

Bash “Shellshock” Vulnerability – Retina Updates

Posted September 24, 2014    BeyondTrust Research Team

A major vulnerability was recently discovered within bash which allows arbitrary command execution via specially crafted environment variables. This is possible due to the fact that bash supports the assignment of shell functions to shell variables. When bash parses environment shell functions, it continues parsing even after the closing brace of the function definition. If…

pbps-blog3

7 Reasons Customers Switch to Password Safe for Privileged Password Management

Posted September 24, 2014    Chris Burd

It’s clear that privileged password management tools are essential for keeping mission-critical data, servers and assets safe and secure. However, as I discussed in my previous post, there are several pitfalls to look out for when deploying a privileged password management solution. At this point, you may be wondering how BeyondTrust stacks up. With that,…

Tags:
, , , , ,