BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Retina in the Cloud

Posted March 10, 2011    Brad Hibbert

We recently expanded our cloud-based security offerings with Retina Cloud, so I figured it was time to post my first blog on eEye and the cloud.

eEye has been providing vulnerability scanning using a SaaS model since 2009 and today, we offer customers a variety of options with respect to vulnerability scanning from the “cloud”.

eEye offers these cloud-based vulnerability scanning options:

  • 1) Self-Service External Vulnerability Scanning or Certified External ASV Scanning eEye recently released Retina Cloud for customers to perform External Vulnerability Scanning and/or certified External ASV scanning using a simple automated self-service web portal. Once customers sign up, they simply select the IP addresses, schedule the scans, and then return to the portal to review the results. There is absolutely no need to install any software or appliances
  • 2) Managed Service Offering: For customers who prefer to outsource their internal vulnerability scanning and endpoint management, eEye has developed strategic partnerships with national and regional security consultants and managed service providers. Our most recent partner announcement was in December 2010 with managed service platform provider, N-able technologies. These partnerships enable dedicated MSP providers to deliver Retina-driven vulnerability and compliance scanning in a totally outsourced model.

For partners or customers with an existing platform, we have also invested to simplify the integration with our core scanning engine – primarily around its licensing, vulnerability updating, result retrieval, and command/control functionality. Of course, this integration can be performed securely from the scanner located within the customer environment over the Internet to a cloud-based security console. Today, partners and customers integrate these scanners using a variety of approaches including command line, web services API, direct database connections, raw files, and event notification.

In addition to providing a SaaS model for performing vulnerability scanning, Retina has also helped several customers secure their assets as they transitioned assets into their private and public “clouds.”

Stay tuned as we continue to grow our cloud-based security offerings in 2011.

Tags:
,

Leave a Reply

Additional articles

red-thumbprint

Why big data breaches won’t always be so easy

Posted September 19, 2014    Byron Acohido

This blog post is republished with the permission of ThirdCertainty. See the original post here. – By: Byron Acohido, Editor-In-Chief, ThirdCertainty Some day, perhaps fairly soon, it will be much more difficult for data thieves to pull off capers like the headline-grabbing hacks of Home Depot and Target. That’s not a pipe dream. It’s the projected outcome…

Tags:
, , , , ,
pbps-blog2

8 Reasons Your Privileged Password Management Solution Will Fail

Posted September 18, 2014    Chris Burd

Leveraging complex, frequently updated passwords is a basic security best practice for protecting privileged accounts in your organization. But if passwords are such a no-brainer, why do two out of three data breaches tie back to poor password management? The fact is that not all privileged password management strategies are created equal, so it’s critical…

Tags:
, , , , , ,
pbps-customer-campaign-image

You Change Your Oil Regularly; Why Not Your Passwords?

Posted September 11, 2014    Chris Burd

There are many things in life that get changed regularly:  your car oil, toothbrush and hopefully, your bed sheets.  It’s rare that you give these things much thought – even when you forget to change them. But what if you’re forgetting something that can cost you millions of dollars if left unchanged for long periods…

Tags:
, , ,