BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Industry Experts Call Retina CS a ‘Flawless’ Best Buy

Posted February 1, 2012    Mike Puterbaugh

Yesterday Morey Haber gave our readers a sneak peek at what was to come with our soon-to-be-announced Retina CS 3.0 release. All of us here at eEye feel 3.0 will drive even greater distance between eEye and our competitors.

Customers speak the loudest with regards to my backing up our claim of market and product leadership, but I also often refer to 3rd party market coverage as well. Today, I’m proud to share with you another clear validation of the value and capabilities that Retina CS delivers to enterprise security, compliance and IT teams. 

SC Magazine Names
Retina CS a 5 Star Best Buy

I’ll let the article speak for itself, but will take the opportunity to point out our clean sweep of 5 Star ratings, across features, ease of use, performance, docs, support and most importantly, value to the business.

Our customers rely on Retina CS to not only manage the day to day security needs of their business, but also to provide really valuable context – mapping the risk within their networks (physical, virtual, cloud) and mobile assets to their business objectives.  Retina CS was so highly rated by SC Magazine due in large part to its ability give users more value than just a laundry list of vulnerabilities, something we hear quite often from new customers who are moving away from vendors who aren’t innovating as quickly as eEye.

I’d love to hear your thoughts on SC Magazine’s review, so please use the comments section below to share your feedback.

Tags:
, , ,

Leave a Reply

Additional articles

pbps-customer-campaign-image

Are you changing your passwords as often as the weather changes?

Posted April 20, 2015    Scott Lang

There is one thing that should change more frequently than the weather: Your privileged passwords. Why? If you’re like more than 25% of companies out there, then your current IT environment contains unmanaged accounts putting you at risk of data breaches and compliance violations, and you don’t have a process to control those accounts.

Tags:
, , , ,
webinar1

On Demand Webinar: Advanced Windows Tracing

Posted April 17, 2015    BeyondTrust Software

Webinar: Security MVP, Paula Januszkiewicz, shows Windows administrators how to be more aware of what happens whenever somebody does something within the system.

Tags:
, ,
5

The Delicate Art of Remote Checks – A Glance Into MS15-034

Posted April 15, 2015    Bill Finlayson

Remote vulnerability detection – using ms15-034 as an example.

Tags:
, ,