BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Industry Experts Call Retina CS a ‘Flawless’ Best Buy

Posted February 1, 2012    Mike Puterbaugh

Yesterday Morey Haber gave our readers a sneak peek at what was to come with our soon-to-be-announced Retina CS 3.0 release. All of us here at eEye feel 3.0 will drive even greater distance between eEye and our competitors.

Customers speak the loudest with regards to my backing up our claim of market and product leadership, but I also often refer to 3rd party market coverage as well. Today, I’m proud to share with you another clear validation of the value and capabilities that Retina CS delivers to enterprise security, compliance and IT teams. 

SC Magazine Names
Retina CS a 5 Star Best Buy

I’ll let the article speak for itself, but will take the opportunity to point out our clean sweep of 5 Star ratings, across features, ease of use, performance, docs, support and most importantly, value to the business.

Our customers rely on Retina CS to not only manage the day to day security needs of their business, but also to provide really valuable context – mapping the risk within their networks (physical, virtual, cloud) and mobile assets to their business objectives.  Retina CS was so highly rated by SC Magazine due in large part to its ability give users more value than just a laundry list of vulnerabilities, something we hear quite often from new customers who are moving away from vendors who aren’t innovating as quickly as eEye.

I’d love to hear your thoughts on SC Magazine’s review, so please use the comments section below to share your feedback.

Tags:
, , ,

Leave a Reply

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,