BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

BeyondTrust Performs Vulnerability Assessment of VMware Solutions Better Than Anyone Else!

Posted May 15, 2013    Morey Haber

Retina from BeyondTrust performs vulnerability assessment of VMware solutions so incredibly, extremely, amazingly much better than anyone else…. Ok, I’m in product management and maybe marketing isn’t my forte, but let me explain to you in all seriousness why I think we’ve done something pretty special here. First, let me pose some real world questions every company running virtualization technology should ask themselves so we can all level set;

  • How do you perform vulnerability assessment of your virtualized guests and hosts?
  • Do you have a scan engine that targets each virtual machine and hypervisor with just like a normal physical asset?
  • Do you treat virtual applications the same way as installed programs for assessment ?
  • How do you assess offline images ? Do you have to power them all on to scan them ?
  • Do you empower virtual server administrators with security tools to assess the risk of guest sessions ?
  • Can you manage images uniquely if they are replicate ?

Recently, BeyondTrust did a vulnerability management survey of end users that use virtualization technology and the results where rather surprising. Many organizations are blind to the unique risks virtualized technology can pose to an organization and even more are stymied by the tools they have to manage them. In addition, many end users do not address the unique characteristics of virtualized technology in their security best practices and assessments. When it all comes together, it seems that the security teams within many companies are just not talking to server and virtual server administrators about risk. There is a process gap and islands of operation that need to begin working together to solve the real world problems of virtualization technology.

Virtual Insecurity Infographic FINAL

Based on this enlightenment, BeyondTrust has been building the most complete vulnerability assessment technology for VMware found on the market today. Here is why:

  • Retina can perform assessments on virtualized devices and identify if the host is a virtual or physical device.
  • Retina can target virtual machines by communicating directly with vCenter to determine which Guests are installed and which ones are powered on.
  • Retina can perform vulnerability assessments on VMware ThinApps.
  • Retina can assess for vulnerabilities of Windows VMware images even if the image is powered off. In addition, Retina can optionally power on any image, change the network adapter to a private network, perform an assessment, and power the image back off for a complete assessment process fully automated.
  • Retina provides a powerful industry unique plugin for vCenter that allows virtual administrators to see vulnerabilities and perform scans directly within the vSphere Client.
  • Retina identifies virtual guests with a unique identify so even cloned or images based on the same template can be tracked as separate assets within the solution.
RetinaVG

No other vulnerability management vendor can handle the unique challenges of a virtualized environment like BeyondTrust. No one else has tools to address these issues and an enterprise architecture that can manage the most complex virtualized environments. Retina is the best product for vulnerability assessment of VMware and BeyondTrust is the best company to do it. Let us prove it to you.

Launch a Free Trial of Retina by BeyondTrust Now!

Tags:
, , , , ,

Additional articles

Dark Reading

2014: The Year of Privilege Vulnerabilities

Posted December 18, 2014    Chris Burd

Of the 30 critical-rated Microsoft Security Bulletins this year, 24 involved vulnerabilities where the age-old best practice of “least privilege” could limit the impact of malware and raise the bar of difficulty for attackers.

Tags:
, , , , ,
dave-shackleford-headshot

Looking back on information security in 2014

Posted December 16, 2014    Dave Shackleford

Dave Shackleford is a SANS Instructor and founder of Voodoo Security. Join Dave for a closer look at the year in security, and learn what you can do to prepare for 2015, with this upcoming webinar. 2014 has been one heck of an insane year for information security professionals. To start with, we’ve been forced…

Tags:
, ,
patch-tuesday

December 2014 Patch Tuesday

Posted December 9, 2014    BeyondTrust Research Team

This month marks the final Patch Tuesday of 2014. Most of what is being patched this month includes Internet Explorer, Exchange, Office, etc… and continues a trend of the greatest hits collection of commonly attacked Microsoft software. Probably the one thing that broke the mold this month is that for once there is not some…

Tags:
,