BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

BeyondTrust Receives 5 Star Rating from SC Magazine

Posted February 4, 2014    Sarah Lieber

Recently our UVM20 Security Management Appliance received a perfect 5-star review + “Best Buy” recognition from SC Magazine. Read the full review here.

The UVM20 includes several pre-installed and pre-configured solutions: Retina Network Security Scanner, PowerBroker for UNIX/Linux, and PowerBroker for Windows, plus our patch management, regulatory reporting and configuration compliance modules — in addition to all of BeyondInsight’s platform capabilities. All starting at $19,995 — What a steal!

An excerpt from SC Magazine follows…

scmag-uvmapplicance-image

Strengths: Solid scanning and vulnerability management features with excellent reporting.
Weaknesses: None that we found.
Verdict: A solid product available as an appliance or software-only, and well worth your attention. It is our choice for Best Buy.

“The UVM20 Security Management Appliance from BeyondTrust offers a full set of vulnerability scanning and compliance tools that are well integrated into a single easy-to-use appliance that features the Retina CS Threat Management Console as the center piece of the suite. Using this console, security professionals and system administrators alike can easily find and analyze weaknesses throughout the entire enterprise infrastructure. The Threat Management Console displays – in an easy-to-read contextual format – results and analytics taken from the Retina Network Security Scanner, as well as other compliance-based tools from BeyondTrust.”

Read the entire review on SC Magazine.

Tags:
, , , , , , , ,

Leave a Reply

Additional articles

PowerBroker for Unix & Linux helps prevent Shellshock

Posted September 25, 2014    Paul Harper

Like many other people who tinker with UNIX and Linux on a regular basis, BASH has always been my shell of choice.  Dating back to the early days moving from Windows to a non-Windows platform, mapping the keys correctly to allow easy navigation and control helped ensure an explosion of use for the shell. Unfortunately,…

Bash “Shellshock” Vulnerability – Retina Updates

Posted September 24, 2014    BeyondTrust Research Team

A major vulnerability was recently discovered within bash which allows arbitrary command execution via specially crafted environment variables. This is possible due to the fact that bash supports the assignment of shell functions to shell variables. When bash parses environment shell functions, it continues parsing even after the closing brace of the function definition. If…

pbps-blog3

7 Reasons Customers Switch to Password Safe for Privileged Password Management

Posted September 24, 2014    Chris Burd

It’s clear that privileged password management tools are essential for keeping mission-critical data, servers and assets safe and secure. However, as I discussed in my previous post, there are several pitfalls to look out for when deploying a privileged password management solution. At this point, you may be wondering how BeyondTrust stacks up. With that,…

Tags:
, , , , ,