BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

BeyondTrust Performs Vulnerability Assessment of VMware Solutions Better Than Anyone Else!

Posted May 15, 2013    Morey Haber

Retina from BeyondTrust performs vulnerability assessment of VMware solutions so incredibly, extremely, amazingly much better than anyone else…. Ok, I’m in product management and maybe marketing isn’t my forte, but let me explain to you in all seriousness why I think we’ve done something pretty special here. First, let me pose some real world questions every company running virtualization technology should ask themselves so we can all level set;

  • How do you perform vulnerability assessment of your virtualized guests and hosts?
  • Do you have a scan engine that targets each virtual machine and hypervisor with just like a normal physical asset?
  • Do you treat virtual applications the same way as installed programs for assessment ?
  • How do you assess offline images ? Do you have to power them all on to scan them ?
  • Do you empower virtual server administrators with security tools to assess the risk of guest sessions ?
  • Can you manage images uniquely if they are replicate ?

Recently, BeyondTrust did a vulnerability management survey of end users that use virtualization technology and the results where rather surprising. Many organizations are blind to the unique risks virtualized technology can pose to an organization and even more are stymied by the tools they have to manage them. In addition, many end users do not address the unique characteristics of virtualized technology in their security best practices and assessments. When it all comes together, it seems that the security teams within many companies are just not talking to server and virtual server administrators about risk. There is a process gap and islands of operation that need to begin working together to solve the real world problems of virtualization technology.

Virtual Insecurity Infographic FINAL

Based on this enlightenment, BeyondTrust has been building the most complete vulnerability assessment technology for VMware found on the market today. Here is why:

  • Retina can perform assessments on virtualized devices and identify if the host is a virtual or physical device.
  • Retina can target virtual machines by communicating directly with vCenter to determine which Guests are installed and which ones are powered on.
  • Retina can perform vulnerability assessments on VMware ThinApps.
  • Retina can assess for vulnerabilities of Windows VMware images even if the image is powered off. In addition, Retina can optionally power on any image, change the network adapter to a private network, perform an assessment, and power the image back off for a complete assessment process fully automated.
  • Retina provides a powerful industry unique plugin for vCenter that allows virtual administrators to see vulnerabilities and perform scans directly within the vSphere Client.
  • Retina identifies virtual guests with a unique identify so even cloned or images based on the same template can be tracked as separate assets within the solution.
RetinaVG

No other vulnerability management vendor can handle the unique challenges of a virtualized environment like BeyondTrust. No one else has tools to address these issues and an enterprise architecture that can manage the most complex virtualized environments. Retina is the best product for vulnerability assessment of VMware and BeyondTrust is the best company to do it. Let us prove it to you.

Launch a Free Trial of Retina by BeyondTrust Now!

Tags:
, , , , ,

Additional articles

PBPS-screenshot-blog aug2014

Failing the Security Basics: Backoff Point-of-Sale Malware

Posted August 22, 2014    Marc Maiffret

At the beginning of this month, US-CERT issued a security alert relating to a string of breaches that had been targeting Point of Sale (POS) systems. The alert details that attackers were leveraging brute forcing tools to target common remote desktop applications such as Microsoft’s Remote Desktop, Apple Remote Desktop, Splashtop and LogMeIn among others….

Tags:
, , , , , ,

Troubleshooting Windows Privilege Management Rules with Policy Monitor

Posted August 21, 2014    Jason Silva

When defining and testing PowerBroker for Windows rules for production or pilots, customers sometimes tell us, “I don’t think this policy / program is working.” This is usually a case of the policy not properly triggering because of the way the rule was created. A unique feature of PowerBroker for Windows compared to other solutions is a client-side…

Tags:
, , ,
darren-mar-elia

BeyondTrust Webcast: Darren Mar-Elia’s 4 Active Directory Change Scenarios to Track

Posted August 20, 2014    Chris Burd

In our latest webcast, we joined Darren Mar-Elia, CTO at SDM Software, to discuss best practices for Active Directory (AD) change management. Here are some key takeaways from the presentation, followed by a link to a full-length video of the presentation. Mar-Elia kicks things off with a critical insight: that the best AD change management…

Tags:
, , , , , , ,