BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

BeyondInsight Evolution is Paving the Way for a Revolution in IT Risk Management

Posted May 27, 2014    Morey Haber

2008: Unifying Vulnerability Management + Endpoint Protection

It all started in 2008, when eEye Digital Security transformed its REM management platform into Retina CS, a solution that could do more than just vulnerability management. Retina CS (short for “Compliance and Security” – or, as we joke internally, for “Chris Silva” our Chief Architect) merged the concepts of vulnerability management and endpoint protection into a single security information technology platform. This was ground-breaking and revolutionary at the time, since it could not only identify asset vulnerabilities but also reveal how assets were being attacked.

2012-2013: Completing the Vulnerability Management Life Cycle

Just before BeyondTrust’s acquisition of eEye, Retina CS added Regulatory Reporting, Configuration Compliance, and Patch Management capabilities to the mix. These extended Retina’s coverage of the vulnerability management life cycle to finding vulnerabilities, analyzing attacks, providing mitigation, and reporting on the results. In addition, Retina CS introduced industry-first technology for cloud, virtual and mobile device assessment – plus an analytics and reporting engine dubbed “Retina Insight.” Even today, no other vulnerability management vendor ships a structured big data warehouse with their product. Ground-breaking and revolutionary to say the least – and centralized under the same installer, platform, and license key.

Retina CS vulnerability management interfaceRetina CS vulnerability management interface

2014: Bridging Vulnerability Management and Privileged Account Management

Fast-forward to January 2014, when BeyondTrust released the BeyondInsight IT Risk Management platform, built on Retina CS technology. Why? It was clear that, in addition to reducing external risk to infrastructure, Retina CS could mitigate internal, user-based risk by incorporating privileged account management data. This concept merges asset risk management with least-privilege access monitoring on Windows, UNIX, Linux, and OS X devices.

A new revolution is being waged. Imagine knowing all the risks about an asset and how users are interacting with those assets. BeyondInsight can do that – Today!

Windows endpoint risk analysis within the BeyondInsight platform
Windows endpoint risk analysis within the BeyondInsight platform

The Future of IT Risk Management

Another generation is in beta: All user accounts discovered and reported in BeyondInsight can now be managed with native PowerBroker Password Safe technology. This evolution enables a complete IT risk management workflow for assets and users. BeyondInsight customers can now not only uncovered asset risk, but also control user access via least privilege management and password vaulting for accounts, services and local access. Using a single platform for all these functions has huge implications for vendor consolidation, cost reduction and training efficiency – let alone risk mitigation.

Password vaulting within the BeyondInsight platformPassword vaulting within the BeyondInsight platform

BeyondTrust is leading the way among security management platforms, not by just adding features, but by rethinking how teams manage modern threats and security. Security solutions have evolved. Welcome to the revolution!

> Learn more about the BeyondInsight IT Risk Management Platform
> Learn more about PowerBroker Password Safe
> White paper: Fusing Vulnerability Data and User Intelligence

Tags:
, , , , , , ,

Leave a Reply

Additional articles

dave-shackleford-headshot

Tales from the Datacenter: Vulnerability Management Nightmares

Posted May 27, 2015    Dave Shackleford

Vulnerability scanning, threat management, risk analysis, patching, and configuration management are some of the major activities usually associated with vulnerability management, and none of these are new…so why are we failing so badly at many of them?

Tags:
, ,
Sudo_logo

Don’t Create a Different sudoers File for Each System

Posted May 20, 2015    Randy Franklin Smith

What if you have multiple Linux and/or Unix systems? Sudo management can become onerous and unwieldy if you try to manage a different sudoers file on each system. The good news is that sudo supports multiple systems.

password-safety

What Does Microsoft Local Administrator Password Solution Really Do?

Posted May 19, 2015    Morey Haber

LAPS is a feature that allows the randomization of local administrator accounts across the domain. Although it would seem that this capability overlaps with features in BeyondTrust’s PowerBroker Password Safe (PBPS), the reality is it is more suited for simple use cases such as changing the local Windows admin account and not much more.

Tags:
, ,