BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

BeyondTrust Named 2012 Industry Innovator by SC Magazine

Post by Sarah Lieber December 21, 2012

sclogoupdated_1448We’re happy to announce that SC Magazine has recognized BeyondTrust as a 2012 Industry Innovator! Read the report here.

What SC Magazine Says.
“BeyondTrust is far more than a one-trick pony. The company’s creativity and drive to innovate is what keeps this organization at the forefront of its market. Like many companies, currently and in the past, BeyondTrust has based a lot of its growth on acquisition of new technology. Whether it buys companies to get the technology, licenses the technology or hires experts to develop them in-house, new approaches to tough problems are what make this Innovator run.”

[...]

“Companies such as BeyondTrust take on a serious responsibility when they provide products that protect their customers…BeyondTrust takes that burden very seriously – and it is part of what drives the innovation within the company.”

[...]

“The imagination and creativity to integrate its overall vision for enterprise security extends from the cloud through the data center to mobile and other endpoint devices. It is the hallmark of this very creative and innovative company.”

Why Retina CS?
Retina CS is the centerpiece of the BeyondTrust’s vision of Context-Aware Security Intelligence, aimed at helping organizations answer the most pressing questions in IT – what to fix first, what to fix next and why? Retina CS does this through unmatched security intelligence and analytics for the entire IT landscape, including support for emerging technology investments such as cloud, mobile and virtualization.

Give Retina CS a whirl…for free!
Try our free version of Retina CS, which allows for the management of vulnerabilities and threats for up to 256 assets. Download your free copy of Retina CS Community.

Tags:
, , , , ,

Leave a Reply

Additional articles

BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,
insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,