BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

BeyondInsight Evolution is Paving the Way for a Revolution in IT Risk Management

Posted May 27, 2014    Morey Haber

2008: Unifying Vulnerability Management + Endpoint Protection

It all started in 2008, when eEye Digital Security transformed its REM management platform into Retina CS, a solution that could do more than just vulnerability management. Retina CS (short for “Compliance and Security” – or, as we joke internally, for “Chris Silva” our Chief Architect) merged the concepts of vulnerability management and endpoint protection into a single security information technology platform. This was ground-breaking and revolutionary at the time, since it could not only identify asset vulnerabilities but also reveal how assets were being attacked.

2012-2013: Completing the Vulnerability Management Life Cycle

Just before BeyondTrust’s acquisition of eEye, Retina CS added Regulatory Reporting, Configuration Compliance, and Patch Management capabilities to the mix. These extended Retina’s coverage of the vulnerability management life cycle to finding vulnerabilities, analyzing attacks, providing mitigation, and reporting on the results. In addition, Retina CS introduced industry-first technology for cloud, virtual and mobile device assessment – plus an analytics and reporting engine dubbed “Retina Insight.” Even today, no other vulnerability management vendor ships a structured big data warehouse with their product. Ground-breaking and revolutionary to say the least – and centralized under the same installer, platform, and license key.

Retina CS vulnerability management interfaceRetina CS vulnerability management interface

2014: Bridging Vulnerability Management and Privileged Account Management

Fast-forward to January 2014, when BeyondTrust released the BeyondInsight IT Risk Management platform, built on Retina CS technology. Why? It was clear that, in addition to reducing external risk to infrastructure, Retina CS could mitigate internal, user-based risk by incorporating privileged account management data. This concept merges asset risk management with least-privilege access monitoring on Windows, UNIX, Linux, and OS X devices.

A new revolution is being waged. Imagine knowing all the risks about an asset and how users are interacting with those assets. BeyondInsight can do that – Today!

Windows endpoint risk analysis within the BeyondInsight platform
Windows endpoint risk analysis within the BeyondInsight platform

The Future of IT Risk Management

Another generation is in beta: All user accounts discovered and reported in BeyondInsight can now be managed with native PowerBroker Password Safe technology. This evolution enables a complete IT risk management workflow for assets and users. BeyondInsight customers can now not only uncovered asset risk, but also control user access via least privilege management and password vaulting for accounts, services and local access. Using a single platform for all these functions has huge implications for vendor consolidation, cost reduction and training efficiency – let alone risk mitigation.

Password vaulting within the BeyondInsight platformPassword vaulting within the BeyondInsight platform

BeyondTrust is leading the way among security management platforms, not by just adding features, but by rethinking how teams manage modern threats and security. Security solutions have evolved. Welcome to the revolution!

> Learn more about the BeyondInsight IT Risk Management Platform
> Learn more about PowerBroker Password Safe
> White paper: Fusing Vulnerability Data and User Intelligence

Tags:
, , , , , , ,

Leave a Reply

Additional articles

PBPS-screenshot-blog aug2014

Failing the Security Basics: Backoff Point-of-Sale Malware

Posted August 22, 2014    Marc Maiffret

At the beginning of this month, US-CERT issued a security alert relating to a string of breaches that had been targeting Point of Sale (POS) systems. The alert details that attackers were leveraging brute forcing tools to target common remote desktop applications such as Microsoft’s Remote Desktop, Apple Remote Desktop, Splashtop and LogMeIn among others….

Tags:
, , , , , ,

Troubleshooting Windows Privilege Management Rules with Policy Monitor

Posted August 21, 2014    Jason Silva

When defining and testing PowerBroker for Windows rules for production or pilots, customers sometimes tell us, “I don’t think this policy / program is working.” This is usually a case of the policy not properly triggering because of the way the rule was created. A unique feature of PowerBroker for Windows compared to other solutions is a client-side…

Tags:
, , ,
darren-mar-elia

BeyondTrust Webcast: Darren Mar-Elia’s 4 Active Directory Change Scenarios to Track

Posted August 20, 2014    Chris Burd

In our latest webcast, we joined Darren Mar-Elia, CTO at SDM Software, to discuss best practices for Active Directory (AD) change management. Here are some key takeaways from the presentation, followed by a link to a full-length video of the presentation. Mar-Elia kicks things off with a critical insight: that the best AD change management…

Tags:
, , , , , , ,