BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

BeyondTrust Receives 5 Star Rating from SC Magazine

Posted February 4, 2014    Sarah Lieber

Recently our UVM20 Security Management Appliance received a perfect 5-star review + “Best Buy” recognition from SC Magazine. Read the full review here.

The UVM20 includes several pre-installed and pre-configured solutions: Retina Network Security Scanner, PowerBroker for UNIX/Linux, and PowerBroker for Windows, plus our patch management, regulatory reporting and configuration compliance modules — in addition to all of BeyondInsight’s platform capabilities. All starting at $19,995 — What a steal!

An excerpt from SC Magazine follows…

scmag-uvmapplicance-image

Strengths: Solid scanning and vulnerability management features with excellent reporting.
Weaknesses: None that we found.
Verdict: A solid product available as an appliance or software-only, and well worth your attention. It is our choice for Best Buy.

“The UVM20 Security Management Appliance from BeyondTrust offers a full set of vulnerability scanning and compliance tools that are well integrated into a single easy-to-use appliance that features the Retina CS Threat Management Console as the center piece of the suite. Using this console, security professionals and system administrators alike can easily find and analyze weaknesses throughout the entire enterprise infrastructure. The Threat Management Console displays – in an easy-to-read contextual format – results and analytics taken from the Retina Network Security Scanner, as well as other compliance-based tools from BeyondTrust.”

Read the entire review on SC Magazine.

Tags:
, , , , , , , ,

Leave a Reply

Additional articles

dave-shackleford-headshot

Tales from the Datacenter: Vulnerability Management Nightmares

Posted May 27, 2015    Dave Shackleford

Vulnerability scanning, threat management, risk analysis, patching, and configuration management are some of the major activities usually associated with vulnerability management, and none of these are new…so why are we failing so badly at many of them?

Tags:
, ,
Sudo_logo

Don’t Create a Different sudoers File for Each System

Posted May 20, 2015    Randy Franklin Smith

What if you have multiple Linux and/or Unix systems? Sudo management can become onerous and unwieldy if you try to manage a different sudoers file on each system. The good news is that sudo supports multiple systems.

password-safety

What Does Microsoft Local Administrator Password Solution Really Do?

Posted May 19, 2015    Morey Haber

LAPS is a feature that allows the randomization of local administrator accounts across the domain. Although it would seem that this capability overlaps with features in BeyondTrust’s PowerBroker Password Safe (PBPS), the reality is it is more suited for simple use cases such as changing the local Windows admin account and not much more.

Tags:
, ,