BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Scalability Part Deuce

Posted October 9, 2013    Morey Haber

It was great to see a flood of email on the previous scalability blog. Thank you all for the emails directly to me on the topic. Based on the responses, I would be remiss not to cover the other three sides of scalability. First, is how we scale down. Retina is a family of solutions. It includes:

  • Retina Network Security Scanner – Vulnerability assessment scan engine that can be licensed and used stand alone or with Retina CS to scale to any enterprise size environment
  • Retina CS Threat Management Console – The central management console for all BeyondTrust solutions from vulnerability management to privileged identity management
  • Retina Insight – A complete structured big data warehouse that ships for free with Retina CS
  • Retina Protection Agent – A light weight agent based scan engine for assets that can not be assessed for vulnerabilities over a network due to environmental and configuration settings

In order to scale down, our clients generally license the Retina Network Security Scanner and perform point and shoot scans as needed to get a snap shot of their environment. This data can generate local reports or be connected to Retina CS at a later time to upload the results for a true air gapped perspective of an environment. Recently, BeyondTrust began offering the Retina Network Security Scanner with an Unlimited scanning license. This new bundle is ideal for every organization to get started with vulnerability assessment or as a secondary tool to verify the results. It is a great way to scale down with unlimited assessment capabilities from your desktop, virtual machine, or server.

retinacs-insight-scalability

The second side of scalability is how we scan down to the desktop or server as an individual entity. Using the Retina Protection Agent, environments can install a light weight agent on their systems to perform scheduled vulnerability assessments and automatically forward the results to Retina CS when a connection is available. This is ideal for mobile laptops and other devices that require an assessment but are not connected reliably to the network and servers that are hardened and do not permit a remote authenticated scan.

vulnerability-assessment-report-scalability

Finally, and again thank you for the feedback, is how we scale wide. Retina has extensive third party integrations and can interface with leading GRC, SEIM, and Call Center technologies. One of the biggest, used in many enterprise environments, is RSA Archer eGRC. Based on the data shown in the previous blog, Archer can consume Threat Management information from Retina CS and display the results as part of your current risk and threat processes. In the screen shot below, that same 100,000 database was consumed in only a few hours and produced information that can scale to any size environment managing risk with this technology.

rsa-archer-scalability

The technology BeyondTrust offers is not just scalable throughout the enterprise; it can truly scale down to individual users and individual security assessment teams. It can scale from a remote user to an enterprise wide eGRC solution. It has been engineered to grow with your business and provide point and shoot technology when stuck in a dreaded fire fight situation (identifying an outbreak on critical systems, for example). The technology we offer can meet your most demanding needs. Learn more about Retina Network Security Scanner Unlimited Now!

Tags:
, , , , , ,

Leave a Reply

Additional articles

powerbroker-for-mac-diagram-small

PowerBroker for Mac: A Least-Privileged Apple a Day…

Posted July 27, 2015    Jason Silva

BeyondTrust PowerBroker for Mac reduces the risk of privilege misuse by enabling standard users on Mac OS X to perform administrative tasks successfully without entering elevated credentials.

Tags:
, ,
PrivilegedAccountManagement

On Demand Webinar – Now is the time for Privileged Account Management

Posted July 24, 2015    BeyondTrust Software

In this webinar, SANS Instructor and Founder of Voodoo Security, Dave Shackleford, will revisit several hacking and breach scenarios that involved privileged accounts, and use these as examples while discussing tools and tactics to get this problem under control once and for all.

Tags:
, ,
dave-shackleford-headshot

Privileged Account Management: The Time is Now

Posted July 22, 2015    Dave Shackleford

There’s plenty of problems we don’t have great options for in InfoSec today. Malware is a pain point that keeps evolving rapidly. 0-day exploits are tough to prepare for. Privileged account management? We got this. We know the root causes, we know how it manifests, we know how to get it under control effectively, and there are great technology solutions that are enterprise-class.

Tags:
, ,