BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Retina in the Cloud

Post by Brad Hibbert March 10, 2011

We recently expanded our cloud-based security offerings with Retina Cloud, so I figured it was time to post my first blog on eEye and the cloud.

eEye has been providing vulnerability scanning using a SaaS model since 2009 and today, we offer customers a variety of options with respect to vulnerability scanning from the “cloud”.

eEye offers these cloud-based vulnerability scanning options:

  • 1) Self-Service External Vulnerability Scanning or Certified External ASV Scanning eEye recently released Retina Cloud for customers to perform External Vulnerability Scanning and/or certified External ASV scanning using a simple automated self-service web portal. Once customers sign up, they simply select the IP addresses, schedule the scans, and then return to the portal to review the results. There is absolutely no need to install any software or appliances
  • 2) Managed Service Offering: For customers who prefer to outsource their internal vulnerability scanning and endpoint management, eEye has developed strategic partnerships with national and regional security consultants and managed service providers. Our most recent partner announcement was in December 2010 with managed service platform provider, N-able technologies. These partnerships enable dedicated MSP providers to deliver Retina-driven vulnerability and compliance scanning in a totally outsourced model.

For partners or customers with an existing platform, we have also invested to simplify the integration with our core scanning engine – primarily around its licensing, vulnerability updating, result retrieval, and command/control functionality. Of course, this integration can be performed securely from the scanner located within the customer environment over the Internet to a cloud-based security console. Today, partners and customers integrate these scanners using a variety of approaches including command line, web services API, direct database connections, raw files, and event notification.

In addition to providing a SaaS model for performing vulnerability scanning, Retina has also helped several customers secure their assets as they transitioned assets into their private and public “clouds.”

Stay tuned as we continue to grow our cloud-based security offerings in 2011.

Tags:
,

Leave a Reply

Additional articles

BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,
insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,