BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

BeyondTrust Performs Vulnerability Assessment of VMware Solutions Better Than Anyone Else!

Posted May 15, 2013    Morey Haber

Retina from BeyondTrust performs vulnerability assessment of VMware solutions so incredibly, extremely, amazingly much better than anyone else…. Ok, I’m in product management and maybe marketing isn’t my forte, but let me explain to you in all seriousness why I think we’ve done something pretty special here. First, let me pose some real world questions every company running virtualization technology should ask themselves so we can all level set;

  • How do you perform vulnerability assessment of your virtualized guests and hosts?
  • Do you have a scan engine that targets each virtual machine and hypervisor with just like a normal physical asset?
  • Do you treat virtual applications the same way as installed programs for assessment ?
  • How do you assess offline images ? Do you have to power them all on to scan them ?
  • Do you empower virtual server administrators with security tools to assess the risk of guest sessions ?
  • Can you manage images uniquely if they are replicate ?

Recently, BeyondTrust did a vulnerability management survey of end users that use virtualization technology and the results where rather surprising. Many organizations are blind to the unique risks virtualized technology can pose to an organization and even more are stymied by the tools they have to manage them. In addition, many end users do not address the unique characteristics of virtualized technology in their security best practices and assessments. When it all comes together, it seems that the security teams within many companies are just not talking to server and virtual server administrators about risk. There is a process gap and islands of operation that need to begin working together to solve the real world problems of virtualization technology.

Virtual Insecurity Infographic FINAL

Based on this enlightenment, BeyondTrust has been building the most complete vulnerability assessment technology for VMware found on the market today. Here is why:

  • Retina can perform assessments on virtualized devices and identify if the host is a virtual or physical device.
  • Retina can target virtual machines by communicating directly with vCenter to determine which Guests are installed and which ones are powered on.
  • Retina can perform vulnerability assessments on VMware ThinApps.
  • Retina can assess for vulnerabilities of Windows VMware images even if the image is powered off. In addition, Retina can optionally power on any image, change the network adapter to a private network, perform an assessment, and power the image back off for a complete assessment process fully automated.
  • Retina provides a powerful industry unique plugin for vCenter that allows virtual administrators to see vulnerabilities and perform scans directly within the vSphere Client.
  • Retina identifies virtual guests with a unique identify so even cloned or images based on the same template can be tracked as separate assets within the solution.
RetinaVG

No other vulnerability management vendor can handle the unique challenges of a virtualized environment like BeyondTrust. No one else has tools to address these issues and an enterprise architecture that can manage the most complex virtualized environments. Retina is the best product for vulnerability assessment of VMware and BeyondTrust is the best company to do it. Let us prove it to you.

Launch a Free Trial of Retina by BeyondTrust Now!

Tags:
, , , , ,

Additional articles

flash-logo

Adobe Patches Zero-Day Flaw Being Exploited in the Wild

Posted January 22, 2015    BeyondTrust Research Team

Earlier this week, French malware researcher Kafeine reported on a new Adobe Flash zero-day vulnerability that was being exploited in the wild using the latest versions of the Angler Exploit Toolkit. “Any version of Internet Explorer or Firefox with any version of Windows will get owned if Flash up to 16.0.0.287 (included) is installed and enabled”…

Tags:
, , , , ,

Your Data Security Strategy Starts with Deploying a Least Privilege Model (part 2 of 2)

Posted January 22, 2015    Scott Lang

In last week’s blog, we talked about how controls and accountability must be put into place so that only the right folks can access data and the systems on which that data resides, and that employing a least privilege model helps to achieve that and more. We’re using conclusions and data from a recent report…

Tags:
, , , ,
Larry-Brock-CISO

Basic Blocking and Tackling for Defending Against Advanced Targeted Attacks

Posted January 22, 2015    Larry Brock

With football season at its pinnacle at both the college and professional levels, the best teams continually focus on the fundamentals that make them successful. In security, we need to do the same.  It is okay for us to have a few key plays, especially in certain industries where we have to focus on unique…

Tags:
, , , , ,