BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Retina in the Cloud

Posted March 10, 2011    Brad Hibbert

We recently expanded our cloud-based security offerings with Retina Cloud, so I figured it was time to post my first blog on eEye and the cloud.

eEye has been providing vulnerability scanning using a SaaS model since 2009 and today, we offer customers a variety of options with respect to vulnerability scanning from the “cloud”.

eEye offers these cloud-based vulnerability scanning options:

  • 1) Self-Service External Vulnerability Scanning or Certified External ASV Scanning eEye recently released Retina Cloud for customers to perform External Vulnerability Scanning and/or certified External ASV scanning using a simple automated self-service web portal. Once customers sign up, they simply select the IP addresses, schedule the scans, and then return to the portal to review the results. There is absolutely no need to install any software or appliances
  • 2) Managed Service Offering: For customers who prefer to outsource their internal vulnerability scanning and endpoint management, eEye has developed strategic partnerships with national and regional security consultants and managed service providers. Our most recent partner announcement was in December 2010 with managed service platform provider, N-able technologies. These partnerships enable dedicated MSP providers to deliver Retina-driven vulnerability and compliance scanning in a totally outsourced model.

For partners or customers with an existing platform, we have also invested to simplify the integration with our core scanning engine – primarily around its licensing, vulnerability updating, result retrieval, and command/control functionality. Of course, this integration can be performed securely from the scanner located within the customer environment over the Internet to a cloud-based security console. Today, partners and customers integrate these scanners using a variety of approaches including command line, web services API, direct database connections, raw files, and event notification.

In addition to providing a SaaS model for performing vulnerability scanning, Retina has also helped several customers secure their assets as they transitioned assets into their private and public “clouds.”

Stay tuned as we continue to grow our cloud-based security offerings in 2011.

Tags:
,

Leave a Reply

Additional articles

CyberResiliency

6 things I like about Gartner’s Cyber Resiliency Strategy

Posted August 27, 2015    Nigel Hedges

There were 6 key principles, or recommendations, that Gartner suggested were important drivers towards a great cyber resiliency posture. I commented more than once during the conference that many of these things were not new. They are all important recommendations that are best when placed together and given to senior management and the board – a critical element of organisations that desperately need to “get it”.

Tags:
,
powerbroker-difference-1

Why Customers Choose PowerBroker: Flexible Deployment Options

Posted August 26, 2015    Scott Lang

BeyondTrust commissioned a study of our customer base in early 2015 to determine how we are different from other alternatives in the market. What we learned was that there were six key differentiators that separate BeyondTrust from other solution providers in the market. We call it the PowerBroker difference,

Tags:
, ,
Mac-Security-Enterprise

On Demand Webinar: Security Risk of Mac OS X in the Enterprise

Posted August 20, 2015    BeyondTrust Software

In the last several years, Mac administrators have come to realize that they may be just as vulnerable to exploits and malware as most other operating systems. New malware and adware is released all the time, and there have been serious vulnerabilities patched by Apple in the past several years, some of which may afford attackers full control of your systems.

Tags:
, ,