BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Microsoft SCCM Integration with Retina CS Threat Management Console

Post by Jerome Diggs November 28, 2012

Overview

Retina CS enables teams to centrally manage organization-wide IT security and compliance initiatives from a single, web-based console. It provides discovery, prioritization, and remediation of security risks by delivering what matters the most – context.

Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the most pressing questions in security – what to fix first, what to fix next and how to fix a vulnerability.

Retina CS does this through unmatched security intelligence and analytics for your entire IT landscape and integrates with SCCM to help complete the vulnerability lifecycle management picture.

Inquire about a free evaluation and get setup to start testing in your environment.

Benefits of Integrating SCCM with Retina CS Threat Management Console

Third-party client side exploits continue to be a favored attack vector especially in widely deployed tools like Adobe Reader and Internet browsers. Recent studies show that third-party programs are responsible for 69% of the vulnerabilities on a typical endpoint.

Retina CS offers centralized role based access to both the security and operations teams needed in any enterprise vulnerability management solution.  The Patch Management Module provides built-in application patching for Microsoft and non-Microsoft applications by extending Microsoft SCCM functionality which many organizations already use today. Prioritize and deploy patches with integrated, automated patching. Quickly fix weaknesses using common deployment features used within SCCM today and see the big picture with end-to-end reporting on the entire patch management cycle.

 

How it Works

Retina CS integrates with SCCM to provide centralized visibility to available Microsoft and various non-Microsoft applications using native SCCM API’s and Beyondtrust’s integration with WSUS (for 3rd party applications).  The connector pulls back relevant SCCM data including computer groups (which can be used for targeted patch deployment), package deployment status and provides the ability to leverage common package deployment options from a single console. Third Party application deployment is facilitated through the use of Microsoft’s WSUS as a back-end to SCCM.  This feature extends the capabilities of SCCM to provide package deployment of various 3rd party applications that are commonly exploited.

Next steps: Download the software for evaluation and testing in your environment.





Tags:
, , , , , , ,

Leave a Reply

Additional articles

smart rules manager for vulnerabilities - v2

A New Way of Looking at Vulnerabilities in Your Environment

Assets, users, vulnerabilities and exploits; all are common themes in my posts on BeyondInsight. With BeyondInsight v5.1, we unveiled a new way to view exploitable assets. Sure, most vulnerability management solutions link vulnerability data to exploit information, allowing tools like NeXpose and QualysGuard to list an asset, its vulnerabilities, and any related exploits. BeyondInsight does…

Post by Morey Haber April 23, 2014
Tags:
, , , , ,
smart rules manager for vulnerabilities

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in…

Post by Morey Haber April 21, 2014
Tags:
, , , , , ,
BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,