Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

BeyondTrust Performs Vulnerability Assessment of VMware Solutions Better Than Anyone Else!

Posted May 15, 2013    Morey Haber

Retina from BeyondTrust performs vulnerability assessment of VMware solutions so incredibly, extremely, amazingly much better than anyone else…. Ok, I’m in product management and maybe marketing isn’t my forte, but let me explain to you in all seriousness why I think we’ve done something pretty special here. First, let me pose some real world questions every company running virtualization technology should ask themselves so we can all level set;

  • How do you perform vulnerability assessment of your virtualized guests and hosts?
  • Do you have a scan engine that targets each virtual machine and hypervisor with just like a normal physical asset?
  • Do you treat virtual applications the same way as installed programs for assessment ?
  • How do you assess offline images ? Do you have to power them all on to scan them ?
  • Do you empower virtual server administrators with security tools to assess the risk of guest sessions ?
  • Can you manage images uniquely if they are replicate ?

Recently, BeyondTrust did a vulnerability management survey of end users that use virtualization technology and the results where rather surprising. Many organizations are blind to the unique risks virtualized technology can pose to an organization and even more are stymied by the tools they have to manage them. In addition, many end users do not address the unique characteristics of virtualized technology in their security best practices and assessments. When it all comes together, it seems that the security teams within many companies are just not talking to server and virtual server administrators about risk. There is a process gap and islands of operation that need to begin working together to solve the real world problems of virtualization technology.

Virtual Insecurity Infographic FINAL

Based on this enlightenment, BeyondTrust has been building the most complete vulnerability assessment technology for VMware found on the market today. Here is why:

  • Retina can perform assessments on virtualized devices and identify if the host is a virtual or physical device.
  • Retina can target virtual machines by communicating directly with vCenter to determine which Guests are installed and which ones are powered on.
  • Retina can perform vulnerability assessments on VMware ThinApps.
  • Retina can assess for vulnerabilities of Windows VMware images even if the image is powered off. In addition, Retina can optionally power on any image, change the network adapter to a private network, perform an assessment, and power the image back off for a complete assessment process fully automated.
  • Retina provides a powerful industry unique plugin for vCenter that allows virtual administrators to see vulnerabilities and perform scans directly within the vSphere Client.
  • Retina identifies virtual guests with a unique identify so even cloned or images based on the same template can be tracked as separate assets within the solution.

No other vulnerability management vendor can handle the unique challenges of a virtualized environment like BeyondTrust. No one else has tools to address these issues and an enterprise architecture that can manage the most complex virtualized environments. Retina is the best product for vulnerability assessment of VMware and BeyondTrust is the best company to do it. Let us prove it to you.

Launch a Free Trial of Retina by BeyondTrust Now!

, , , , ,

Additional articles


October 2015 Patch Tuesday

Posted October 13, 2015    BeyondTrust Research Team

This month’s Patch Tuesday is on the lighter side, offering up six bulletins and 33 vulnerabilities in total. The critical bulletins to watch out for involve IE, JScript/VBScript, and Windows Shell.


Retina CS Vulnerability Management Solution Gets Primetime Award for Innovation

Posted October 12, 2015    Sandi Green

Analyst firm Frost & Sullivan presented BeyondTrust with the 2015 award for ‘Best Practices in Enabling Technology Leadership in the Vulnerability Management Industry.

, ,

Answering the age-old question, ‘What’s plugged into my network?’

Posted October 9, 2015    Alejandro DaCosta

“What’s plugged into my network?” is a question I hear frequently from security administrators. And, really, it’s no surprise why. No longer do we have to account just for the physical servers in our datacenters, workstations and a few network devices. Now we need to keep track of roaming laptops, dynamic virtual systems, off-site cloud deployments and BYOD.